Biometric characteristics in the management system of information technology processes
The article presents the research results on the organization of the authentication procedure for access to technological information systems. A rational sequence of user identification for access to information based on the selection of biometric characteristics of a person is proposed. The selecti...
Sábháilte in:
Príomhchruthaitheoirí: | Kuzmenko, V. V., Кузьменко, В. В. |
---|---|
Formáid: | Статья |
Teanga: | English |
Foilsithe / Cruthaithe: |
TUENGR GROUP
2021
|
Ábhair: | |
Rochtain ar líne: | https://dspace.ncfu.ru/handle/20.500.12258/16637 |
Clibeanna: |
Cuir clib leis
Níl clibeanna ann, Bí ar an gcéad duine le clib a chur leis an taifead seo!
|
Míreanna comhchosúla
-
A simulation device model for managing access to confidential information stored in a cloud
de réir: Malofey, O. P., et al.
Foilsithe / Cruthaithe: (2022) -
Some peculiarities of using GPR for detection of alive humans under the collapsed buildings
de réir: Yakushev, V. M., et al.
Foilsithe / Cruthaithe: (2018) -
Some peculiarities of using GPR for detection of alive humans under the collapsed buildings
de réir: Yakushev, V. M., et al.
Foilsithe / Cruthaithe: (2018) -
Synthesis of models for ensuring information security of subjects of critical information infrastructure under destructive influences
de réir: Lapina, M. A., et al.
Foilsithe / Cruthaithe: (2022) -
Anthropomorphic model of states of subjects of critical information infrastructure under destructive influences
de réir: Lapina, M. A., et al.
Foilsithe / Cruthaithe: (2022)