[1]
Boloban, S.I., Pereguda A.М. and Uminsky, V.V. 2009. Authentification methods of informational-communication systems users. Military Technical Collection. 2 (Dec. 2009), 47–52. DOI:https://doi.org/10.33577/2312-4458.2.2009.47-52.