|
|
Publications in Math-Net.Ru |
Citations |
|
2021 |
1. |
D. N. Kolegov, Yu. R. Khalniyazova, “WireGuard protocol with GOST cipher suites”, Prikl. Diskr. Mat. Suppl., 2021, no. 14, 81–84 |
2. |
D. N. Kolegov, Yu. R. Khalniyazova, “Threshold Diffie — Hellman Protocol”, Prikl. Diskr. Mat. Suppl., 2021, no. 14, 79–81 |
|
2017 |
3. |
D. N. Kolegov, O. V. Broslavsky, N. E. Oleksov, “Towards ABAC Engine framework”, Prikl. Diskr. Mat. Suppl., 2017, no. 10, 115–120 |
1
|
|
2016 |
4. |
D. N. Kolegov, N. O. Tkachenko, “Lightweight implementation of ABAC mechanism on Database Firewall”, Prikl. Diskr. Mat. Suppl., 2016, no. 9, 93–95 |
1
|
5. |
D. N. Kolegov, P. A. Lineytsev, “Web application firewalls identification in MitB-model”, Prikl. Diskr. Mat. Suppl., 2016, no. 9, 92–93 |
6. |
D. N. Kolegov, O. V. Broslavsky, N. E. Oleksov, “HMAC obfuscation method for implementation in untrusted systems”, Prikl. Diskr. Mat. Suppl., 2016, no. 9, 89–91 |
|
2015 |
7. |
D. N. Kolegov, O. V. Broslavsky, N. E. Oleksov, “Hooked-browser network with BeEF and Google Drive”, Prikl. Diskr. Mat., 2015, no. 4(30), 72–76 |
8. |
D. N. Kolegov, O. V. Broslavsky, N. E. Oleksov, “Covert timing channels over HTTP cache-control headers”, Prikl. Diskr. Mat., 2015, no. 2(28), 71–85 |
2
|
9. |
D. N. Kolegov, N. O. Tkachenko, “Non-invasive method of mandatory access control implementaion on DBMS layer in web applications”, Prikl. Diskr. Mat. Suppl., 2015, no. 8, 89–92 |
2
|
10. |
D. N. Kolegov, O. V. Broslavsky, N. E. Oleksov, “Non-invasive integrity control method for cookie in web applications”, Prikl. Diskr. Mat. Suppl., 2015, no. 8, 85–89 |
1
|
11. |
D. N. Kolegov, O. V. Broslavsky, N. E. Oleksov, “Implementation of covert timing channels based on HTTP cache headers in cloud file storage services”, Prikl. Diskr. Mat. Suppl., 2015, no. 8, 83–85 |
|
2014 |
12. |
D. N. Kolegov, O. V. Broslavsky, N. E. Oleksov, “Covert timing channel over HTTP cache-control headers”, Prikl. Diskr. Mat. Suppl., 2014, no. 7, 89–91 |
1
|
13. |
D. N. Kolegov, “General method for HTTP messages authentication based on hash functions in web applications”, Prikl. Diskr. Mat. Suppl., 2014, no. 7, 85–89 |
1
|
|
2013 |
14. |
D. N. Kolegov, N. O. Tkachenko, D. V. Chernov, “Development and implementation of mandatory access control mechanisms in DBMS MySQL”, Prikl. Diskr. Mat. Suppl., 2013, no. 6, 62–67 |
3
|
|
2012 |
15. |
D. N. Kolegov, “Hierarchical role-based access control development”, Prikl. Diskr. Mat., 2012, no. 3(17), 70–76 |
1
|
16. |
D. N. Kolegov, B. S. Hasanov, ““Network security architectures fundamentals” laboratory practice in Cisco Packet Tracer”, Prikl. Diskr. Mat. Suppl., 2012, no. 5, 71–73 |
17. |
D. N. Kolegov, “Hierarchical role-based access control”, Prikl. Diskr. Mat. Suppl., 2012, no. 5, 69–71 |
1
|
|
2011 |
18. |
D. N. Kolegov, “The development feutures of network access control DP-model”, Prikl. Diskr. Mat., 2011, no. supplement № 4, 46–48 |
|
2010 |
19. |
D. N. Kolegov, “Teaching the protected computer nets design at the Cisco platform”, Prikl. Diskr. Mat., 2010, no. supplement № 3, 53–55 |
1
|
|
2009 |
20. |
D. N. Kolegov, “Approaches to security of computer systems with functionally or parametrically associated entities”, Prikl. Diskr. Mat., 2009, no. supplement № 1, 44–46 |
21. |
D. N. Kolegov, “Modeling network computer systems with vulnerabilities”, Prikl. Diskr. Mat., 2009, no. 3(5), 91–99 |
22. |
D. N. Kolegov, “Security analysis of the information flows by memory in the computer systems with functional and parametric associated entities”, Prikl. Diskr. Mat., 2009, no. 1(3), 117–125 |
3
|
23. |
D. N. Kolegov, “Usage formal models for vulnerability analysis”, Prikl. Diskr. Mat., 2009, no. 1(3), 113–116 |
|
2008 |
24. |
D. N. Kolegov, Yu. N. Chernushenko, “About the CTF – computer security competitions”, Prikl. Diskr. Mat., 2008, no. 2(2), 81–83 |
3
|
25. |
M. A. Kachanov, D. N. Kolegov, “Security linux extension based on system calls interposition”, Prikl. Diskr. Mat., 2008, no. 2(2), 76–80 |
1
|
26. |
D. N. Kolegov, “DP-model application for network security analysis”, Prikl. Diskr. Mat., 2008, no. 1(1), 71–87 |
3
|
|
|
|
2021 |
27. |
A. A. Gorodilova, N. N. Tokareva, S. V. Agievich, C. Carlet, V. A. Idrisova, K. V. Kalgin, D. N. Kolegov, A. V. Kutsenko, N. Mouha, M. A. Pudovkina, A. N. Udovenko, “The Seventh International Olympiad in Cryptography: problems and solutions”, Sib. Èlektron. Mat. Izv., 18:2 (2021), 4–29 |
3
|
|
Organisations |
|
|
|
|