[1]
Аулов, І.Ф. 2015. The research of the threat model of the cloud key systems and protection proposals against them. Eastern-European Journal of Enterprise Technologies. 5, 2(77) (Oct. 2015), 4–13. DOI:https://doi.org/10.15587/1729-4061.2015.50912.