|
|
Publications in Math-Net.Ru
-
WireGuard protocol with GOST cipher suites
Prikl. Diskr. Mat. Suppl., 2021, no. 14, 81–84
-
Threshold Diffie — Hellman Protocol
Prikl. Diskr. Mat. Suppl., 2021, no. 14, 79–81
-
Towards ABAC Engine framework
Prikl. Diskr. Mat. Suppl., 2017, no. 10, 115–120
-
Lightweight implementation of ABAC mechanism on Database Firewall
Prikl. Diskr. Mat. Suppl., 2016, no. 9, 93–95
-
Web application firewalls identification in MitB-model
Prikl. Diskr. Mat. Suppl., 2016, no. 9, 92–93
-
HMAC obfuscation method for implementation in untrusted systems
Prikl. Diskr. Mat. Suppl., 2016, no. 9, 89–91
-
Hooked-browser network with BeEF and Google Drive
Prikl. Diskr. Mat., 2015, no. 4(30), 72–76
-
Covert timing channels over HTTP cache-control headers
Prikl. Diskr. Mat., 2015, no. 2(28), 71–85
-
Non-invasive method of mandatory access control implementaion on DBMS layer in web applications
Prikl. Diskr. Mat. Suppl., 2015, no. 8, 89–92
-
Non-invasive integrity control method for cookie in web applications
Prikl. Diskr. Mat. Suppl., 2015, no. 8, 85–89
-
Implementation of covert timing channels based on HTTP cache headers in cloud file storage services
Prikl. Diskr. Mat. Suppl., 2015, no. 8, 83–85
-
Covert timing channel over HTTP cache-control headers
Prikl. Diskr. Mat. Suppl., 2014, no. 7, 89–91
-
General method for HTTP messages authentication based on hash functions in web applications
Prikl. Diskr. Mat. Suppl., 2014, no. 7, 85–89
-
Development and implementation of mandatory access control mechanisms in DBMS MySQL
Prikl. Diskr. Mat. Suppl., 2013, no. 6, 62–67
-
Hierarchical role-based access control development
Prikl. Diskr. Mat., 2012, no. 3(17), 70–76
-
“Network security architectures fundamentals” laboratory practice in Cisco Packet Tracer
Prikl. Diskr. Mat. Suppl., 2012, no. 5, 71–73
-
Hierarchical role-based access control
Prikl. Diskr. Mat. Suppl., 2012, no. 5, 69–71
-
The development feutures of network access control DP-model
Prikl. Diskr. Mat., 2011, no. supplement № 4, 46–48
-
Teaching the protected computer nets design at the Cisco platform
Prikl. Diskr. Mat., 2010, no. supplement № 3, 53–55
-
Approaches to security of computer systems with functionally or parametrically associated entities
Prikl. Diskr. Mat., 2009, no. supplement № 1, 44–46
-
Modeling network computer systems with vulnerabilities
Prikl. Diskr. Mat., 2009, no. 3(5), 91–99
-
Security analysis of the information flows by memory in the computer systems with functional and parametric associated entities
Prikl. Diskr. Mat., 2009, no. 1(3), 117–125
-
Usage formal models for vulnerability analysis
Prikl. Diskr. Mat., 2009, no. 1(3), 113–116
-
About the CTF – computer security competitions
Prikl. Diskr. Mat., 2008, no. 2(2), 81–83
-
Security linux extension based on system calls interposition
Prikl. Diskr. Mat., 2008, no. 2(2), 76–80
-
DP-model application for network security analysis
Prikl. Diskr. Mat., 2008, no. 1(1), 71–87
-
The Seventh International Olympiad in Cryptography: problems and solutions
Sib. Èlektron. Mat. Izv., 18:2 (2021), 4–29
© , 2026