[1]
Evseev, S.P. and Tomashevskyy, B.P. 2015. TWO-FACTOR AUTHENTICATION METHODS THREATS ANALYSIS. Radio Electronics, Computer Science, Control. 1 (Jun. 2015). DOI:https://doi.org/10.15588/1607-3274-2015-1-7.