ПросмотрВыпуск 2022, №3 (140) по теме "authentication"
Отображаемые элементы 1-1 из 1
-
Comparison of information security methods of information-communication infrastructure: Multi-Factor Authentication
(L.N.Gumilyov Eurasian National University, 2022)Sensitive information was always one of the big trade-offs we always exchange big secrets for small ones. On one hand, memorization of small secrets on the other hand tons of services requires a dedicated secret for each one. And when one of the services will be compromised it affects all services with the same password and credential. The main purpose of this article is to ...2023-06-02
