Development of two-factor authentication system for employees's personal office of "Univeris" system
Journal of computational and engineering mathematics, Tome 3 (2016) no. 3, pp. 62-67.

Voir la notice de l'article provenant de la source Math-Net.Ru

The work is dedicated to the development of two-factor authentication system for employee's personal office of "Univeris" system. The general concepts of multifactor authentication system, the methods to implement two-factor authentication systems, their advantages and disadvantages are presented.
Keywords: two-factor authentication, 2FA, multifactor authentication.
@article{JCEM_2016_3_3_a6,
     author = {P. S. Gritsenko and N. D. Zylyarkina},
     title = {Development of two-factor authentication system for employees's personal office of {"Univeris"} system},
     journal = {Journal of computational and engineering mathematics},
     pages = {62--67},
     publisher = {mathdoc},
     volume = {3},
     number = {3},
     year = {2016},
     language = {en},
     url = {http://geodesic.mathdoc.fr/item/JCEM_2016_3_3_a6/}
}
TY  - JOUR
AU  - P. S. Gritsenko
AU  - N. D. Zylyarkina
TI  - Development of two-factor authentication system for employees's personal office of "Univeris" system
JO  - Journal of computational and engineering mathematics
PY  - 2016
SP  - 62
EP  - 67
VL  - 3
IS  - 3
PB  - mathdoc
UR  - http://geodesic.mathdoc.fr/item/JCEM_2016_3_3_a6/
LA  - en
ID  - JCEM_2016_3_3_a6
ER  - 
%0 Journal Article
%A P. S. Gritsenko
%A N. D. Zylyarkina
%T Development of two-factor authentication system for employees's personal office of "Univeris" system
%J Journal of computational and engineering mathematics
%D 2016
%P 62-67
%V 3
%N 3
%I mathdoc
%U http://geodesic.mathdoc.fr/item/JCEM_2016_3_3_a6/
%G en
%F JCEM_2016_3_3_a6
P. S. Gritsenko; N. D. Zylyarkina. Development of two-factor authentication system for employees's personal office of "Univeris" system. Journal of computational and engineering mathematics, Tome 3 (2016) no. 3, pp. 62-67. http://geodesic.mathdoc.fr/item/JCEM_2016_3_3_a6/

[1] 2FA, Inc. (2014). Two factor strong authentication, simplified (accessed on 7 June 2016) http://2fa.com/wp-content/uploads/2014/04/2FA-Public-Safety-2014.pdf

[2] SecurEnvoy, Ltd. (2016). What is Two Factor Authentication (accessed on 7 June 2016) https://www.securenvoy.com/two-factor-authentication/what-is-2fa.shtm

[3] S. Konyavskaya, N. Komarova, “Plyusy i minusy dvukhfaktornoi autentifikatsii”, Informatsionnaya bezopasnost, 2007, no. 6, 48–49

[4] Kaspersky, Lab. (2016). Chto takoe dvukhfaktornaya autentifikatsiya i zachem ona nuzhna (zapros 7 iyunya 2016) https://blog.kaspersky.ru/what_is_two_factor_authenticatio/4272/

[5] Aladdin R.D. (2016). Resheniya dlya strogoi autentifikatsii (zapros 7 iyunya 2016) http://www.aladdin-rd.ru/solutions/authentication/