Skip to main content
Log in

The results of priority research in the field of information security

  • Published:
Scientific and Technical Information Processing Aims and scope

Abstract

The main factors that currently contribute to the increase of the vulnerability of computer information are considered. The dynamics of a number of promising scientific research areas in the field of information security (cryptography, computer steganography, and biometric information-protection systems) are analyzed based on Russian and foreign publications from VINITI databases over the past decade. The obtained data to a certain extent reflect the direction of the development of these research areas, which is defined by corresponding publication streams.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Zemskov, A.I. and Shraiberg, Ya.L., Elektronnaya informatsiya i elektronnye resursy (Electronic Information and Electronic Resources), Moscow: Izd. Fair, 2007.

    Google Scholar 

  2. Arutyunov, V.V., On the effectiveness of scientific activities in the priority fields of science, technology, and engineering, Sci. Tech. Inf. Process., 2013, vol. 40, no. 4, pp. 180–184.

    Article  Google Scholar 

  3. Arutyunov, V.V., The expansion of studies of anti-terrorist activities in the beginning of the XXI century, in Sbornik statei “Sovremennye problemy i zadachi obespecheniya informatsionnoi bezopasnosti” (Collection of Articles “Modern Challenges of Information Security”), Moscow: MFYuA, 2015.

    Google Scholar 

  4. Rodichev, Yu.A., Informatsionnaya bezopasnost': normativno-pravovye aspekty: Uchebnoe posobie (Information Security: Legal Aspects: Textbook), St. Petersburg: Piter, 2008.

    Google Scholar 

  5. Arutyunov, V.V., Kriptograficheskaya zashchita informatsii (uchebnoe posobie) (Cryptographic Protection of Information (Manual)), Moscow: MFYuA, 2013.

    Google Scholar 

  6. Barichev, S.G. and Serov, R.E., Osnovy sovremennoi kriptografii (Foundations of Modern Cryptography), Moscow: Goryachaya Liniya Telekom, 2011.

    Google Scholar 

  7. Gashkov, S.B., Primenko, E.A., and Cherepnev, M.A., Kriptograficheskie metody zashchity informatsii (uchebnoe posobie) (Cryptographic Methods of Information Protection (Manual)), Moscow: Akademiya, 2010.

    Google Scholar 

  8. Korzhik, V.I. and Kushnir, D.V., Kriptograficheskie metody i sredstva obespecheniya informatsionnoi bezopasnosti: Uchebnoe posobie (Cryptographic Methods and Means of Information Security: Textbook), St. Petersburg: SPbGUT, 2012.

    Google Scholar 

  9. The Physics of Quantum Information: Quantum Cryptography, Quantum Teleportation, Quantum Computation, Bouwmeester, D., Ekert, A.K., and Zeilinger, A., Eds., Springer, 2000.

  10. Puzyrenko, A.Yu. and Konakhovich, G.F., Komp’yuternaya steganografiya. Teoriya i praktika (Computer Steganography. Theory and Practice), Moscow: MKPress, 2006.

    Google Scholar 

  11. Chernyshov, A.V., Mirnaya, A.N., and Evenko, I.A., Komp’yuternaya steganografiya kak metod zashchity peredavaemoi informatsii (Computer Steganography as a Method of Protection of Transmitted Information), Stavropol’: OOO Guberniya, 2013.

    Google Scholar 

  12. Arutyunov, V.V., Biometriya na sluzhbe zashchity informatsii (Biometrics at the Service of Information Protection), Moscow: Litera, 2012.

    Google Scholar 

  13. Ivanov, A.I., Nazarov, I.G., Funtikov, V.A., and Yazov, Yu.K., Neirosetevaya zashchita personal’nykh biometricheskikh dannykh (Neuronet Protection of Personal Biometric Data), Moscow: Radiotekhnika, 2012.

    Google Scholar 

  14. Neirosetevye preobrazovateli biometricheskikh obrazov cheloveka v kod ego lichnogo kriptograficheskogo klyucha. Kn. 29 (Neuronet Converters of Human Biometric Images into the Code of a Personal Cryptographic Key. Book 29), Moscow: Izd. Radiotekh., 2008.

  15. Bondar’, V.V. and Grigoryan, L.A., How many scientific publications are published in Russia per year?, Materialy 8-i mezhdunarodnoi konferentsii “NTI-2012” (Proc. of the 8th Int. Conf. STI-2012), Moscow: VINITI, 2012.

    Google Scholar 

  16. BioAPI Consortium. http://www.bioAPI.org. Cited June 2015.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to V. V. Arutyunov.

Additional information

Original Russian Text © V.V. Arutyunov, 2016, published in Nauchno-Technicheskaya Informatsiya, Seriya 1, 2016, No. 2, pp. 8–13.

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Arutyunov, V.V. The results of priority research in the field of information security. Sci. Tech.Inf. Proc. 43, 42–46 (2016). https://doi.org/10.3103/S014768821601007X

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.3103/S014768821601007X

Keywords

Navigation