Skip to content
Scientific and practical cyber security journal | ISSN 2587-4667
KA
RU
Home page
About journal
Issues archive
Author guidelines
Terms & conditions
User license
Contact us
Menu
Home page
About journal
Issues archive
Author guidelines
Terms & conditions
User license
Contact us
Categories: Authentication
MATHEMATICAL MODELING: ALGORITHMIC STRUCTURES OF DOD COMMON ACCESS CARDS
Beyond The Vault: Evaluating authentication controls within secure storage mobile applications