Keyword "AUTHENTICATION" found in the following publications:
In the development of information technology, software and data protection on web services are of great importance. To ...
APPLICATION OF MULTIMODAL AUTHENTICATION AT CRITICAL INFORMATION INFRASTRUCTURE FACILITIES
The security of the operation of the objects of the critical information infrastructure of the Russian Federation determines ...
CLASSIFICATION OF DETECTION AND RECOGNITION METHODS OF THE PERSON ON THE IMAGE
The concept of the intellectual hall of meetings means implementation of a subsystem of control and access control. ...
RESEARCH OF SPEECH ENCRYPTION RELIABILITY IN GSM MOBILE COMMUNICATION TECHNOLOGY
The article analyzes the strength of the A5/1 stream cipher algorithm in the GSM cellular communication system based ...
COMPARATIVE ANALYSIS OF POPULAR FACIAL RECOGNITION TECHNIQUES IN THE IMAGES
In the operation of informatization objects, the necessary condition for their functioning is the presence of an authentication subsystem. The ...
TRENDS IN THE BANKING INDUSTRY IN THE ERA OF DIGITAL TECHNOLOGY DEVELOPMENT
The intensive development and spread of digital technologies have a significant impact on the financial market. More and more ...
IMPROVED GRAPHICAL AUTHENTICATION  ALGORITHM WITH ANTI-SPYING PROTECTION 
This article provides an example of implementing graphical user authentication based on a triangle scheme. The relevance of the ...
USING BLOCKCHAIN TECHNOLOGY TO ENSURE SECURITY IN THE DISTRIBUTED INTERNET OF THINGS
The use of Blockchain in the Internet of Things networks is an innovative approach that can make communication ...
The approach realized in the developed mathematical model of the multimodal user authentication system, obtaining an estimate of ...
ANALYSIS OF WAYS TO IMPLEMENT A MULTI-FACTOR AUTHENTICATION SYSTEM
The role of vulnerabilities in information security occupies a large niche, for traditional one-factor authentication is a serious ...
PHENOMENOLOGICAL ANALYSIS OF EXISTING AUTHENTICATION METHODS
The article discusses authentication methods for users of local area networks and automated workplaces in order to determine ...