User Guide
Why can I only view 3 results?
You can also view all results when you are connected from the network of member institutions only. For non-member institutions, we are opening a 1-month free trial version if institution officials apply.
So many results that aren't mine?
References in many bibliographies are sometimes referred to as "Surname, I", so the citations of academics whose Surname and initials are the same may occasionally interfere. This problem is often the case with citation indexes all over the world.
How can I see only citations to my article?
After searching the name of your article, you can see the references to the article you selected as soon as you click on the details section.
 Views 27
 Downloands 1
Monitoring algorithm of two-factor authentication method based on рasswindow system
2015
Journal:  
Eastern-European Journal of Enterprise Technologies
Author:  
Abstract:

The paper deals with the basic methods of constructing a two-factor authentication system based on cryptographic mechanisms for ensuring the cryptographic security of the authenticators formed. Risk assessment of various methods of online attacks against various two-factor authentication systems is carried out. The PassWindow system, which provides two-factor authentication on the unique ability of the matrix particles to transmit information in a way that it is deciphered only when imposing the physical template of characters of the intended recipient and barcode template, obtained through electron-network devices of users is considered. Resistance to the analysis is provided by a unique generation of barcode template of the card as unique statistical images, a sequence of characters or a more extended animated version. The object of the research is the process of improving the integrity and authenticity of data packets in security protocols of banking transactions based on two-factor authentication methods. The subject of the study are control methods and algorithms of the integrity and authenticity of data packets in security protocols of banking transactions based on two-factor authentication methods. The aim is to increase the integrity and authenticity of data packets in security protocols of banking transactions, threat assessment of two-factor authentication methods. A comparative analysis of various two-factor authentication systems with the PassWindow system in withstanding various Internet attack scenario is performed. Author Biographies Сергей Петрович Евсеев, Simon Kuznets Kharkiv National University of Economics pr. Lenina 9a, Kharkov, Ukraine, 61166 Ph.D., Associate ProfessorInformation Systems Department

Keywords:

Citation Owners
Information: There is no ciation to this publication.
Similar Articles










Eastern-European Journal of Enterprise Technologies

Field :   Fen Bilimleri ve Matematik

Journal Type :   Uluslararası

Metrics
Article : 4.764
Cite : 4.485
2023 Impact : 0.294
Eastern-European Journal of Enterprise Technologies