The results of priority research in the field of information security
Tóm tắt
Từ khóa
Tài liệu tham khảo
Zemskov, A.I. and Shraiberg, Ya.L., Elektronnaya informatsiya i elektronnye resursy (Electronic Information and Electronic Resources), Moscow: Izd. Fair, 2007.
Arutyunov, V.V., On the effectiveness of scientific activities in the priority fields of science, technology, and engineering, Sci. Tech. Inf. Process., 2013, vol. 40, no. 4, pp. 180–184.
Arutyunov, V.V., The expansion of studies of anti-terrorist activities in the beginning of the XXI century, in Sbornik statei “Sovremennye problemy i zadachi obespecheniya informatsionnoi bezopasnosti” (Collection of Articles “Modern Challenges of Information Security”), Moscow: MFYuA, 2015.
Rodichev, Yu.A., Informatsionnaya bezopasnost': normativno-pravovye aspekty: Uchebnoe posobie (Information Security: Legal Aspects: Textbook), St. Petersburg: Piter, 2008.
Arutyunov, V.V., Kriptograficheskaya zashchita informatsii (uchebnoe posobie) (Cryptographic Protection of Information (Manual)), Moscow: MFYuA, 2013.
Barichev, S.G. and Serov, R.E., Osnovy sovremennoi kriptografii (Foundations of Modern Cryptography), Moscow: Goryachaya Liniya Telekom, 2011.
Gashkov, S.B., Primenko, E.A., and Cherepnev, M.A., Kriptograficheskie metody zashchity informatsii (uchebnoe posobie) (Cryptographic Methods of Information Protection (Manual)), Moscow: Akademiya, 2010.
Korzhik, V.I. and Kushnir, D.V., Kriptograficheskie metody i sredstva obespecheniya informatsionnoi bezopasnosti: Uchebnoe posobie (Cryptographic Methods and Means of Information Security: Textbook), St. Petersburg: SPbGUT, 2012.
The Physics of Quantum Information: Quantum Cryptography, Quantum Teleportation, Quantum Computation, Bouwmeester, D., Ekert, A.K., and Zeilinger, A., Eds., Springer, 2000.
Puzyrenko, A.Yu. and Konakhovich, G.F., Komp’yuternaya steganografiya. Teoriya i praktika (Computer Steganography. Theory and Practice), Moscow: MKPress, 2006.
Chernyshov, A.V., Mirnaya, A.N., and Evenko, I.A., Komp’yuternaya steganografiya kak metod zashchity peredavaemoi informatsii (Computer Steganography as a Method of Protection of Transmitted Information), Stavropol’: OOO Guberniya, 2013.
Arutyunov, V.V., Biometriya na sluzhbe zashchity informatsii (Biometrics at the Service of Information Protection), Moscow: Litera, 2012.
Ivanov, A.I., Nazarov, I.G., Funtikov, V.A., and Yazov, Yu.K., Neirosetevaya zashchita personal’nykh biometricheskikh dannykh (Neuronet Protection of Personal Biometric Data), Moscow: Radiotekhnika, 2012.
Neirosetevye preobrazovateli biometricheskikh obrazov cheloveka v kod ego lichnogo kriptograficheskogo klyucha. Kn. 29 (Neuronet Converters of Human Biometric Images into the Code of a Personal Cryptographic Key. Book 29), Moscow: Izd. Radiotekh., 2008.
Bondar’, V.V. and Grigoryan, L.A., How many scientific publications are published in Russia per year?, Materialy 8-i mezhdunarodnoi konferentsii “NTI-2012” (Proc. of the 8th Int. Conf. STI-2012), Moscow: VINITI, 2012.
BioAPI Consortium. http://www.bioAPI.org. Cited June 2015.