, НТУУ «Київський політехнічний інститут імені Ігоря Сікорського», Ukraine
-
Ukrainian Information Security Research Journal Vol. 19 No. 2 (2017) - Articles
Lover bounsd for the data complexity of correlation attacks on stream ciphers over fields of order 2^r
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Information Security Research Journal Vol. 20 No. 3 (2018) - Articles
Using of the Q-analysis for the determining protection of the information system
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Information Security Research Journal Vol. 19 No. 2 (2017) - Articles
Descriptive analysis of analogies between information security management and queuing systems
Abstract PDF (Українська) PDF PDF (Русский)