Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Anton Andreevich Krasnopevtsev"'
Publikováno v:
Безопасность информационных технологий, Vol 22, Iss 4 (2015)
The number of bank accounts and payment cards, the number and volume of transactions, the number of payment terminals are analyzed based on statistical data which provided by the Central Bank of Russia. The paper discusses the development trends of t
Externí odkaz:
https://doaj.org/article/c9e277affbae45f6a97b8f401cb442f4
Publikováno v:
Безопасность информационных технологий, Vol 22, Iss 3 (2015)
The article describes practical approaches for realization of automatized regression functional and load testing on random software-hardware complex, based on «MARSh 3.0» sample. Testing automatization is being realized for «MARSh 3.0» informatio
Externí odkaz:
https://doaj.org/article/1b8896d0f4ab494c8c6438e80b417f8f
Publikováno v:
Безопасность информационных технологий, Vol 22, Iss 1 (2015)
The article describes functional and load testing automatization process for instrument of trusted session ensuring “MARSh 3.0”, received during scientific work execution. Testing automatization is being realized for “MARSh 3.0” information s
Externí odkaz:
https://doaj.org/article/fdd6f365964148d792ae5d7ea97672da
Publikováno v:
Безопасность информационных технологий, Vol 20, Iss 3, Pp 72-74 (2013)
At this paper authors describe the methodic of detecting non-declared capabilities of JavaCard software, which can disclose privacy of secret key.
Externí odkaz:
https://doaj.org/article/a4cf0417f34f4cf88bf6afaf3818b301
Publikováno v:
Безопасность информационных технологий, Vol 20, Iss 2, Pp 5-7 (2013)
Existing physical security systems has wide range of lacks, including: high cost, a large number of vulnerabilities, problems of modification and support system. This paper covers an actual problem of developing systems without this list of drawbacks
Externí odkaz:
https://doaj.org/article/73b4a297429445308e6429a00fc16fae
Publikováno v:
Безопасность информационных технологий, Vol 20, Iss 1, Pp 63-65 (2013)
This article is devoted to a new approach to Grid-network protection against malware, based on artificial immune system usage. In the article possible Grid-network attacks, immune system coordinator architecture, immune system modules architecture, G
Externí odkaz:
https://doaj.org/article/fbbb79918b754691abb853fd1c9e8b44
Publikováno v:
Безопасность информационных технологий, Vol 21, Iss 1 (2014)
At this paper the author describes attacks for removable key devices platforms.
Externí odkaz:
https://doaj.org/article/58978899354f47aca6aa13f03a91da1e
Publikováno v:
Безопасность информационных технологий, Vol 20, Iss 1, Pp 74-74 (2013)
Removable key carriers are most widespread devices for cryptographic key systems. The most popular platform for them is JavaCard. However, an on-card bytecode verifier is only optional on JavaCard smartcards, and indeed most cards do not include it.
Externí odkaz:
https://doaj.org/article/e137e5c7053745299d06f822eaa01900