[1]
Гадецька, З.М., Омельчук, Д.Г. and Литвин, Р.В. 2013. Identification and authentication - methods of protection from unauthorized access. Eastern-European Journal of Enterprise Technologies. 2, 2(62) (Apr. 2013), 8–10. DOI:https://doi.org/10.15587/1729-4061.2013.12347.