Publication schedule
  • №1 March 2026

Articles by keywords "authentication"

ALGORITHM FOR EMBEDDING DIGITAL WATERMARK IN DYNAMIC MEMORY OF EXECUTABLE CODE

Applied cryptography
  • Year: 2022
  • Issue: 2
  • 0
  • 366
  • Pages: 30-34

On the practicality of attacks on electronic document management systems when signature keys are jointly used in TLS 1.2

Applied cryptography
  • Year: 2025
  • Issue: 4
  • 21
  • 591
  • Pages: 89-101

Authentication of electronic vehicle control units based on hidden channels

Cyber-physic systems security
  • Year: 2025
  • Issue: 4
  • 14
  • 468
  • Pages: 59-75

Authentication of intelligent electronic devices in IoT network with the edge computing architecture

Applied cryptography
  • Year: 2021
  • Issue: 2
  • 3
  • 510
  • Pages: 82-88

Authentication and key establishment in WSN based on key pre-distribution

Applied cryptography
  • Year: 2021
  • Issue: 4
  • 0
  • 468
  • Pages: 61-71

Analysis of the reliability of storing templates when introducing modern biometric technologies into information security systems

Information security application
  • Year: 2024
  • Issue: 2
  • 3
  • 600
  • Pages: 44-56

Mobile device user data protection approach based on multi-factor authentication, visual cryptography and steganography

Information security application
  • Year: 2023
  • Issue: 1
  • 2
  • 596
  • Pages: 26-36

Location privacy and security in self-driving vehicles: a ZKP-enhanced ECDDH based authentication framework

Network and telecommunication security
  • Year: 2025
  • Issue: 2
  • 10
  • 686
  • Pages: 71-85