Voir la notice de l'article provenant de la source Math-Net.Ru
@article{MAIS_2013_20_4_a6, author = {Vitaly Petrov and Maria Komar and Yevgeny Koucheryavy}, title = {A {Novel} {Approach} to {Many-to-Many} {User} {Authentication} in {Different} {Information} {Systems}}, journal = {Modelirovanie i analiz informacionnyh sistem}, pages = {91--103}, publisher = {mathdoc}, volume = {20}, number = {4}, year = {2013}, language = {ru}, url = {http://geodesic.mathdoc.fr/item/MAIS_2013_20_4_a6/} }
TY - JOUR AU - Vitaly Petrov AU - Maria Komar AU - Yevgeny Koucheryavy TI - A Novel Approach to Many-to-Many User Authentication in Different Information Systems JO - Modelirovanie i analiz informacionnyh sistem PY - 2013 SP - 91 EP - 103 VL - 20 IS - 4 PB - mathdoc UR - http://geodesic.mathdoc.fr/item/MAIS_2013_20_4_a6/ LA - ru ID - MAIS_2013_20_4_a6 ER -
%0 Journal Article %A Vitaly Petrov %A Maria Komar %A Yevgeny Koucheryavy %T A Novel Approach to Many-to-Many User Authentication in Different Information Systems %J Modelirovanie i analiz informacionnyh sistem %D 2013 %P 91-103 %V 20 %N 4 %I mathdoc %U http://geodesic.mathdoc.fr/item/MAIS_2013_20_4_a6/ %G ru %F MAIS_2013_20_4_a6
Vitaly Petrov; Maria Komar; Yevgeny Koucheryavy. A Novel Approach to Many-to-Many User Authentication in Different Information Systems. Modelirovanie i analiz informacionnyh sistem, Tome 20 (2013) no. 4, pp. 91-103. http://geodesic.mathdoc.fr/item/MAIS_2013_20_4_a6/
[1] Dan Griffin, “Safer Authentication with a One–Time Password Solution”, MSDN, 5 (2008)
[2] PIN-kod PLAS No 122, 2007
[3] Tsifrovoi sertifikat www.authority.ru/scdp/page?als=504349
[4] Kriptograficheskii token www.rsa.com/rsalabs/node.asp?id=2133
[5] Biometrics research Group — What is biometrics?, http://biometrics.cse.msu.edu/info/index.html
[6] R. Biddle, S. Chiasson, P. C. van Oorschot, Graphical Passwords: Learning from Fisrt Generation, Technical Report TR-09-09, School of Computer Science, Carleton University, Ottawa, Canada, 2009
[7] Besprovodnoi klyuch ot PK http://www.rohos.ru/2011/05/security-performances-with-wireless-pc-lock/
[8] M. Komar, Zaschischennoe khranilische dokumentov, vypusknaya kvalifikatsionnaya rabota bakalavra, Yaroslavl, 2013
[9] Vitaly Petrov, Maria Komar, Yevgeni Koucheryavy, “A Lightweight Many-to-Many Authentication Protocol for Near Field Communications”, 21st IEEE International Conference on Network Protocols (Goettingen, Germany, 2013)
[10] Google Inc. — Google Wallet www.google.com/wallet/26.05.2011
[11] Apple iWallet www.patentlyapple.com/patently-apple/tech-nfc/11.06.2013
[12] codeREADr project www.codereadr.com/2009-2013
[13] Universalnaya elektronnaya karta http://www.uecard.ru/2010–2013
[14] VeriChip www.positiveidcorp.com/2013
[15] Single point of failure www.techopedia.com/definition/4351/single-point-of-failure-spof
[16] Kerberos: The Network Authentication Protocol http://web.mit.edu/kerberos/
[17] GOST R ISO/MEK 17799-2005 (in Russian)
[18] Terekhov A. N., Tiskin A. V., “Kriptografiya s otkrytym klyuchom: ot teorii k standartu”, Programmirovanie, 1994, no. 5, 17–22 (in Russian)
[19] Advanced Encryption Standard csrc.nist.gov/publications/fips/fips197/fips-197.pdf
[20] Xuejia Lai, James Massey, “A Proposal for a New Block Encryption Standard”, EUROCRYPT'90, 1990 | MR
[21] WiFi Alliance http://www.wi-fi.org/
[22] Wireless USB Specification http://www.businesswire.com/news/home/20100929005516/en/Wireless-USB-1.1-Specification