[1]
S. I. Boloban, Pereguda A. М., and V. V. Uminsky, “Authentification methods of informational-communication systems users”, ВТЗ, no. 2, pp. 47–52, Dec. 2009.