Fast Two-Factor Authentication Method in Systems With a Centralized User's Database

B Rezanov, H Kuchuk - 2022 IEEE 3rd KhPI Week on …, 2022 - ieeexplore.ieee.org
work proposes a two-factor authentication method by integrating the second factor into the
authentication service in system with a centralized user's database. This approach made it …

Methodology for determining the rational number of UAVs taking into account their reliability in emergency situations

I Ruban, V Lebediev - 2022 IEEE 3rd KhPI Week on Advanced …, 2022 - ieeexplore.ieee.org
Creating a system of control and analysis of emergency situations is an important task for
most countries of the world. Currently, projects have been initiated to analyze, assess the …

[PDF][PDF] МЕТОД ПІДТРИМКИ ПРИЙНЯТИХ РІШЕНЬ ЩОДО БЕЗПЕКИ ПРОГРАМНОГО ЗАБЕЗПЕЧЕННЯ

ОП Черних - repository.kpi.kharkov.ua
Наукова новизна отриманих результатів обумовлена теоретичним узагальненням і
новим вирішенням важливої науково-технічної проблеми, яка полягає в розробці …

Resource distribution method in computer systems on integrated software platforms

НГ Кучук, ГМ Зубрицький… - Системи обробки …, 2022 - journal-hnups.com.ua
Computer Systems on Integrated Software Platforms are gaining popularity among users.
They have a number of advantages over other platforms. In particular, this is a reduction in …