Development of a device for protection against unauthorized access based on three-factor identification and user authentication
Saved in:
| Date: | 2021 |
|---|---|
| Main Authors: | A. O. Azarova, N. O. Bilichenko, V. S. Kataiev, P. V. Pavlovskyi |
| Format: | Article |
| Language: | English |
| Published: |
2021
|
| Series: | Data recording, storage & processing |
| Online Access: | http://jnas.nbuv.gov.ua/article/UJRN-0001273343 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Library portal of National Academy of Sciences of Ukraine | LibNAS |
Institution
Library portal of National Academy of Sciences of Ukraine | LibNASSimilar Items
Development of a device for protection against unauthorized access based on three-factor identification and user authentication
by: Азарова, А. О., et al.
Published: (2021)
by: Азарова, А. О., et al.
Published: (2021)
Increasing the resilience of the method of protection to ensure the authenticity of raster images of the evidence base from unauthorized access.
by: Pavlenko, B. V., et al.
Published: (2019)
by: Pavlenko, B. V., et al.
Published: (2019)
Increasing the resilience of the method of protection to ensure the authenticity of raster images of the evidence base from unauthorized access
by: B. V. Pavlenko, et al.
Published: (2018)
by: B. V. Pavlenko, et al.
Published: (2018)
Galois fields algebra utilization for implementation of the conception of zero-knowledge under identification and authentication of remote users
by: O. P. Markovskyi, et al.
Published: (2017)
by: O. P. Markovskyi, et al.
Published: (2017)
Unauthorized agent from a comparative perspective
by: Y. Pokhodun
Published: (2017)
by: Y. Pokhodun
Published: (2017)
Provision of regulation secure remote access to users of information-analytical system which support the budget process
by: S. O. Dovhyi, et al.
Published: (2013)
by: S. O. Dovhyi, et al.
Published: (2013)
Black Open Access in Ukraine: Analysis of Downloading Sci-Hub Publications by Ukrainian Internet Users
by: S. A. Nazarovets
Published: (2018)
by: S. A. Nazarovets
Published: (2018)
Protection of the rights of users of electronic communications services in wartime
by: O. M. Vinnyk
Published: (2022)
by: O. M. Vinnyk
Published: (2022)
The identification of anthocyanins by HPLC as the method of confirmation of authenticity of the fruit and berry staff and ready produce
by: R. V. Karbovskaja, et al.
Published: (2008)
by: R. V. Karbovskaja, et al.
Published: (2008)
Neural network based method of a user identification by keyboard handwriting
by: Danyliuk, I. I., et al.
Published: (2018)
by: Danyliuk, I. I., et al.
Published: (2018)
Neural network based method of a user identification by keyboard handwriting
by: I. I. Danyliuk, et al.
Published: (2018)
by: I. I. Danyliuk, et al.
Published: (2018)
Open Access and Copyright Protection: BOAI20
by: Yu. Kalinina-Symonchuk
Published: (2022)
by: Yu. Kalinina-Symonchuk
Published: (2022)
Increase of Authenticity of Assessment of Expenditures
by: S. V. Vashchylin
Published: (2013)
by: S. V. Vashchylin
Published: (2013)
Methodical approaches to authentication of factors of placing of economic activity in the cities with metropolitan functions
by: Yu. Yu. Stadnytska
Published: (2013)
by: Yu. Yu. Stadnytska
Published: (2013)
Types of biometric authentication and methods of their evaluation
by: K. V. Kolesnikov, et al.
Published: (2017)
by: K. V. Kolesnikov, et al.
Published: (2017)
The issue of authentic interpretation: current state of research
by: O. M. Kostiuk
Published: (2016)
by: O. M. Kostiuk
Published: (2016)
Using collection of durum spring wheat accessions for identification of lodging resistance sources
by: S. O. Khomenko, et al.
Published: (2019)
by: S. O. Khomenko, et al.
Published: (2019)
Authentication of Continuous Function is in Unidimensional Parabolic Equalization
by: N. A. Volodin, et al.
Published: (2013)
by: N. A. Volodin, et al.
Published: (2013)
Somatosensory and Motor Functions in Smartphone Systematic Users and Non-Users
by: Y. M. Lim, et al.
Published: (2017)
by: Y. M. Lim, et al.
Published: (2017)
Akseologicheskoe understanding authenticity human being S. Kerkegorom
by: P. A. Kravchenko
Published: (2013)
by: P. A. Kravchenko
Published: (2013)
The concept of authenticity in the Ukrainian futurism: the comparative aspect
by: A. Bila
Published: (2015)
by: A. Bila
Published: (2015)
Simulated reality: authenticity of information and mass media
by: S. A. Loznytsia
Published: (2022)
by: S. A. Loznytsia
Published: (2022)
Authentic interpretation of legal norms: theoretical aspect
by: M. V. Osiadla
Published: (2021)
by: M. V. Osiadla
Published: (2021)
Problems of authentication of region as subject of political activity
by: M. Hordiienko
Published: (2009)
by: M. Hordiienko
Published: (2009)
Cloud service for authentication of a person based on their electrocardiogram
by: Luhovskyi, Yu.O.
Published: (2023)
by: Luhovskyi, Yu.O.
Published: (2023)
A new approach to access to environmental information and protection of environmental rights
by: A. M. Hurova
Published: (2020)
by: A. M. Hurova
Published: (2020)
Issue of Authenticity of Peasant Memoirs Describing Holodomor of 1932-1933
by: O. Alieksieiev
Published: (2020)
by: O. Alieksieiev
Published: (2020)
Civil society in Ukraine: three conditions of coming to "open access"
by: M. I. Milova, et al.
Published: (2012)
by: M. I. Milova, et al.
Published: (2012)
Authentication Method of Interaction Parties Based on Reccurent Sequences
by: Yaremchuk, Yu. Е.
Published: (2013)
by: Yaremchuk, Yu. Е.
Published: (2013)
Cooling of heat protective suit with the foam device
by: T. V. Kostenko
Published: (2017)
by: T. V. Kostenko
Published: (2017)
Accessing the Global Intellectual Property Market: Intelligent Decisions about Patent Protection
by: Levy, S.D.
Published: (2005)
by: Levy, S.D.
Published: (2005)
Audit procedures for confirmation of financial statements authenticity: solving of the problems
by: H. O. Tkachuk, et al.
Published: (2021)
by: H. O. Tkachuk, et al.
Published: (2021)
Three Perspectives on Responsibility for Russia’s War Against Ukraine
by: S. Sayapin
Published: (2024)
by: S. Sayapin
Published: (2024)
Functional basis of means of adapting user interfaces to the users' cognitive characteristics in automated systems
by: Yu. O. Furtat
Published: (2013)
by: Yu. O. Furtat
Published: (2013)
Analysis of the probabalistic filters usage for authentication tokens invalidation in distributed systems
by: S. V. Khruschak, et al.
Published: (2024)
by: S. V. Khruschak, et al.
Published: (2024)
Protection of thermoelectric converters against electrical overloads
by: P. D. Mykytiuk, et al.
Published: (2018)
by: P. D. Mykytiuk, et al.
Published: (2018)
Protection of thermoelectric converters against electrical overloads
by: P. D. Mikitjuk, et al.
Published: (2018)
by: P. D. Mikitjuk, et al.
Published: (2018)
Audit result and its users
by: N. S. Shalimova
Published: (2014)
by: N. S. Shalimova
Published: (2014)
Seljouks in the Crimea (to the Issue of Authenticity of the Moslem Authors' Evidences)
by: O. S. Mavrina
Published: (2008)
by: O. S. Mavrina
Published: (2008)
Mathematical methods of identification of Ukrainian enterprises competitiveness level by fuzzy logic using
by: A. Azarova, et al.
Published: (2013)
by: A. Azarova, et al.
Published: (2013)
Similar Items
-
Development of a device for protection against unauthorized access based on three-factor identification and user authentication
by: Азарова, А. О., et al.
Published: (2021) -
Increasing the resilience of the method of protection to ensure the authenticity of raster images of the evidence base from unauthorized access.
by: Pavlenko, B. V., et al.
Published: (2019) -
Increasing the resilience of the method of protection to ensure the authenticity of raster images of the evidence base from unauthorized access
by: B. V. Pavlenko, et al.
Published: (2018) -
Galois fields algebra utilization for implementation of the conception of zero-knowledge under identification and authentication of remote users
by: O. P. Markovskyi, et al.
Published: (2017) -
Unauthorized agent from a comparative perspective
by: Y. Pokhodun
Published: (2017)