Development of a device for protection against unauthorized access based on three-factor identification and user authentication
A device to provide protection against unauthorized access to information based on the use of three-factor identification and user authentication with the ability to differentiate access to the information environment containing confidential information has been developed. Differentiation of access...
Saved in:
| Date: | 2021 |
|---|---|
| Main Authors: | Азарова, А. О., Біліченко, Н. О., Катаєв, В. С., Павловський, П. В. |
| Format: | Article |
| Language: | Ukrainian |
| Published: |
Інститут проблем реєстрації інформації НАН України
2021
|
| Subjects: | |
| Online Access: | http://drsp.ipri.kiev.ua/article/view/239250 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Data Recording, Storage & Processing |
Institution
Data Recording, Storage & ProcessingSimilar Items
Neural network based method of a user identification by keyboard handwriting
by: Danyliuk, I. I., et al.
Published: (2018)
by: Danyliuk, I. I., et al.
Published: (2018)
Increasing the resilience of the method of protection to ensure the authenticity of raster images of the evidence base from unauthorized access.
by: Pavlenko, B. V., et al.
Published: (2019)
by: Pavlenko, B. V., et al.
Published: (2019)
Authentication Method of Interaction Parties Based on Reccurent Sequences
by: Yaremchuk, Yu. Е.
Published: (2013)
by: Yaremchuk, Yu. Е.
Published: (2013)
Identifying the intentions of a user communicating with a bot
by: Теленик, С. Ф., et al.
Published: (2023)
by: Теленик, С. Ф., et al.
Published: (2023)
Development and Researches of Fitness of Expert Tool «Fractal-M» for Authentication of Announcer on the Parameters of Vocal Signals
by: Solovyov, V. I., et al.
Published: (2014)
by: Solovyov, V. I., et al.
Published: (2014)
Specialized Processors for Realization of Authentication of Subjects (objects) of Interaction Based on Recurrent Sequences
by: Iaremchuk, I. E.
Published: (2014)
by: Iaremchuk, I. E.
Published: (2014)
Improvement of role-based access control model in private cloud environments
by: Volynets, O. Yu., et al.
Published: (2019)
by: Volynets, O. Yu., et al.
Published: (2019)
On fibers and accessibility of groups acting on trees with inversions
by: Mahmood, Rasheed Mahmood Saleh
Published: (2015)
by: Mahmood, Rasheed Mahmood Saleh
Published: (2015)
Інструментальні засоби непараметричної ідентифікації нелінійних динамічних систем на основі моделей Вольтерра у частотній області
by: Pavlenko, Vitaliy Danylovich, et al.
Published: (2014)
by: Pavlenko, Vitaliy Danylovich, et al.
Published: (2014)
THE PROBLEM OF FACIAL IDENTIFICATION OF SANDY BODIES AND THE WAYS OF ITS SOLVING
by: LUKIN, A. E., et al.
Published: (2012)
by: LUKIN, A. E., et al.
Published: (2012)
Identification of defects of the piles with reflected waves
by: Lebid, O., et al.
Published: (2018)
by: Lebid, O., et al.
Published: (2018)
Online detection of phase resistance of switched reluctance motor by sinusoidal signal injection
by: Lee, Y.
Published: (2025)
by: Lee, Y.
Published: (2025)
Possibility of the use of data of infrasonic monitoring for identification of the nature of seismic events
by: Lyashchuk, A., et al.
Published: (2015)
by: Lyashchuk, A., et al.
Published: (2015)
Investigation of the factors of informal communication inside social networks for identification of agents carrying privacy threats
by: Nikiforova, L. A., et al.
Published: (2016)
by: Nikiforova, L. A., et al.
Published: (2016)
РОЗРАХУНОК ФУНКЦІЇ ЧИСЕЛЬНОСТІ НАСЕЛЕННЯ ДЛЯ ДИНАМІЧНОЇ МОДЕЛІ З НЕПЕРЕРВНИМ ЧАСОМ
by: Zagorodni, Yuriy, et al.
Published: (2008)
by: Zagorodni, Yuriy, et al.
Published: (2008)
Identification of Voice Characteristics on the Base of Wavelet Transformation Maximums
by: Solovyev, V. I.
Published: (2013)
by: Solovyev, V. I.
Published: (2013)
Identification of Audio Recording Devices Using Statistical Characteristics of the Audio Files
by: Solovyov, V. I.
Published: (2013)
by: Solovyov, V. I.
Published: (2013)
Identification of parameters of structure of soil curvilinear massifs by numerical methods of complex analysis
by: Bomba, A.Ya., et al.
Published: (2022)
by: Bomba, A.Ya., et al.
Published: (2022)
A research of invisible errors in bibliographic data input and its impact on the quality and search accessibility
by: Петренко , М. В.
Published: (2021)
by: Петренко , М. В.
Published: (2021)
Problems of long-term data storage
by: Manko, D. Yu., et al.
Published: (2017)
by: Manko, D. Yu., et al.
Published: (2017)
Energetic GTE parameters identification at the stage of lapping works
by: Тарелин, Анатолий Алексеевич, et al.
Published: (2015)
by: Тарелин, Анатолий Алексеевич, et al.
Published: (2015)
Energetic GTE parameters identification at the stage of lapping works
by: Тарелин, Анатолий Алексеевич, et al.
Published: (2015)
by: Тарелин, Анатолий Алексеевич, et al.
Published: (2015)
THE METHOD AND ALGORITHMS FOR IDENTIFICATION OF DYNAMIC OBJECTS ON BASIS OF INTEGRAL EQUATIONS
by: Diachuk, Aleksandr Anatolievich, et al.
Published: (2013)
by: Diachuk, Aleksandr Anatolievich, et al.
Published: (2013)
Elements of the structural models of devices approximation problems for identification and control of parameters of facilities management
by: Жиленков, А. А., et al.
Published: (2013)
by: Жиленков, А. А., et al.
Published: (2013)
Elements of the structural models of devices approximation problems for identification and control of parameters of facilities management
by: Жиленков, А. А., et al.
Published: (2013)
by: Жиленков, А. А., et al.
Published: (2013)
Study of the development of built environment inclusiveness in Ukraine
by: Kryvomaz, Tetiana I., et al.
Published: (2024)
by: Kryvomaz, Tetiana I., et al.
Published: (2024)
UX research methods and strategies in the development of interactive interfaces
by: Kostiuk, Anton, et al.
Published: (2025)
by: Kostiuk, Anton, et al.
Published: (2025)
Citation databases and researcher identifiers
by: Yakimchik, A. I.
Published: (2020)
by: Yakimchik, A. I.
Published: (2020)
Порогова оптимізація risk-based автентифікації під вартісні регуляторні обмеження PSD2
by: Курніцький, Д.П., et al.
Published: (2026)
by: Курніцький, Д.П., et al.
Published: (2026)
Method of Digital Signature Producing and Verification Based on Recurrent Sequences
by: Iaremchuk, Iu. Е.
Published: (2013)
by: Iaremchuk, Iu. Е.
Published: (2013)
Calculations of the electronic structure of gold monolayers with linear defects based on Density Functional Theory (DFT). Study of monolayers of gold using a scanning tunneling microscope
by: Romansky Anastas, et al.
Published: (2025)
by: Romansky Anastas, et al.
Published: (2025)
Methodical Aspects of the Conceptual Design of Automated Systems
by: Samokhvalov, Yu. Ya., et al.
Published: (2012)
by: Samokhvalov, Yu. Ya., et al.
Published: (2012)
ВИРОЩУВАННЯ КОНТЕЙНЕРНИХ СІЯНЦІВ ДУБА ЗВИЧАЙНОГО З ВИКОРИСТАННЯМ СУБСТРАТІВ РІЗНОГО СКЛАДУ
by: Gupal, V. V.
Published: (2018)
by: Gupal, V. V.
Published: (2018)
Identification of Earthen dam seepage regime under condition of data ambiguity
by: Demianiuk, Alla V., et al.
Published: (2019)
by: Demianiuk, Alla V., et al.
Published: (2019)
Peculiarities of identifying a power-generating single-shaft gte mathematical model
by: Lyutikov, A. L.
Published: (2019)
by: Lyutikov, A. L.
Published: (2019)
Peculiarities of identifying a power-generating single-shaft gte mathematical model
by: Lyutikov, A. L.
Published: (2019)
by: Lyutikov, A. L.
Published: (2019)
Analysis of the Impact of Structural Features of Diffractive Optical Modulators on Image Contrast
by: Yurlov, V. I., et al.
Published: (2013)
by: Yurlov, V. I., et al.
Published: (2013)
To the problem of time dependence regaining for non-stationary influence which acts on elastically deformed element of construction
by: Янчевский, И. В.
Published: (2015)
by: Янчевский, И. В.
Published: (2015)
The mathematical and computer modelling of the building constructions on the R-functions basis
by: Литвинова, Ю. С., et al.
Published: (2014)
by: Литвинова, Ю. С., et al.
Published: (2014)
To the problem of time dependence regaining for non-stationary influence which acts on elastically deformed element of construction
by: Янчевский, И. В.
Published: (2015)
by: Янчевский, И. В.
Published: (2015)
Similar Items
-
Neural network based method of a user identification by keyboard handwriting
by: Danyliuk, I. I., et al.
Published: (2018) -
Increasing the resilience of the method of protection to ensure the authenticity of raster images of the evidence base from unauthorized access.
by: Pavlenko, B. V., et al.
Published: (2019) -
Authentication Method of Interaction Parties Based on Reccurent Sequences
by: Yaremchuk, Yu. Е.
Published: (2013) -
Identifying the intentions of a user communicating with a bot
by: Теленик, С. Ф., et al.
Published: (2023) -
Development and Researches of Fitness of Expert Tool «Fractal-M» for Authentication of Announcer on the Parameters of Vocal Signals
by: Solovyov, V. I., et al.
Published: (2014)