z-logo
open-access-imgOpen Access
TWO-FACTOR AUTHENTICATION METHODS THREATS ANALYSIS
Author(s) -
Сергей Петрович Евсеев,
B P Tomashevskyy
Publication year - 2015
Publication title -
radìoelektronìka, ìnformatika, upravlìnnâ/radìoelektronika, ìnformatika, upravlìnnâ
Language(s) - Uncategorized
Resource type - Journals
eISSN - 2313-688X
pISSN - 1607-3274
DOI - 10.15588/1607-3274-2015-1-7
Subject(s) - computer science , multi factor authentication , computer security , authentication protocol , authentication (law) , email authentication , chip authentication program , network packet , data authentication algorithm , computer network

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here