Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Viktor Yevetskyi"'
Publikováno v:
Collection "Information Technology and Security". 8:144-152
Consideration is given to the question of user`s handwritten signature parameters informativeness and stability during authentication. An identifier that uses biometric characteristics is inextricably linked to the user and it is almost impossible to
Autor:
Viktor Yevetskyi, Ivan Horniichuk
Selection and evaluation of handwritten signature indicators in user authentication systems are considered. An important and unresolved issue of information security is the effective identification of the user who accesses confidential information. T
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::6b321f5b369d1cc69e9b8923d0fc8194
https://doi.org/10.20535/2411-1031.2020.8.1.217994
https://doi.org/10.20535/2411-1031.2020.8.1.217994
Autor:
Ivan Horniichuk, Viktor Yevetskyi
Publikováno v:
Collection "Information technology and security". 6:19-28
Consideration is given to the use of biometric characteristics in order to increase the efficiency of user authentication. An identifier that uses biometric characteristics is inextricably linked to the user, and it is virtually impossible to use it
The use of biometric characteristics to improve the efficiency of user authentication is considered. An identifier that uses biometric characteristics is inextricably linked to the user and is virtually impossible to use it unauthorized. According to
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::ba99e9b637d81ae9ecdd3f84da85bb8e
https://doi.org/10.20535/2411-1031.2019.7.1.184213
https://doi.org/10.20535/2411-1031.2019.7.1.184213
Autor:
Ivan Horniichuk, Viktor Yevetskyi
Publikováno v:
Збірник "Information Technology and Security"; Том 4, № 1 (2016): Information Technology and Security; 27-33
Сборник "Information Technology and Security"; Том 4, № 1 (2016); 27-33
Collection "Information technology and security"; Том 4, № 1 (2016): Information Technology and Security; 27-33
Сборник "Information Technology and Security"; Том 4, № 1 (2016); 27-33
Collection "Information technology and security"; Том 4, № 1 (2016): Information Technology and Security; 27-33
Questions of biometric characteristics using for increase efficiency of user authentication are briefly considered in article. The identifier using biometric characteristics is inseparably linked with the user, and it is illegally almost impossible t
Autor:
Viktor Yevetskyi
Publikováno v:
Collection "Information technology and security". 3:132-137
Autor:
Viktor Yevetskyi
Publikováno v:
Збірник "Information Technology and Security"; Том 1, № 2 (2012); 14-16
Сборник "Information Technology and Security"; Том 1, № 2 (2012); 14-16
Collection "Information technology and security"; Том 1, № 2 (2012); 14-16
Сборник "Information Technology and Security"; Том 1, № 2 (2012); 14-16
Collection "Information technology and security"; Том 1, № 2 (2012); 14-16
У статті коротко розглянуто відносно новий спосіб захисту комп'ютерної інформації - використання біометричної ідентифікації користува