The article considers basic methods of two-factor authentication system constructing on the basis of the use of cryptographic mechanisms<br />to ensure the reliability, of formed authenticators, the risk of various methods of online attacks against a variety of two-factor authentication<br />systems is estimated, as well as a system PassWindow is considered, which provides two-factor authentication on the unique ability of the<br />matrix to transmit information in such a way that it is deciphered only to the imposition of the physical signs of the intended recipient pattern<br />and barcode pattern obtained by digital network devices, resistance to the analysis is provided by a unique barcode card pattern generation as<br />unique statistical images, a sequence of characters, or as more extended in an animated version. The object of the research is the process of improving the integrity and authenticity of data packets in banking transactions security protocols on the basis of two-factor authentication methods. The subject of the study is methods and algorithms of integrity control and authenticity of data packets in banking transaction security protocols on the basis of two-factor authentication methods. The aim of the paper is to increase the integrity and authenticity of data packets in banking transactions security protocols, a banking transaction, threat assessment on two-factor authentication methods. A comparative analysis of various systems with two-factor authentication PassWindow system in opposition to various Internet attack scenario is being carried out. An effective method for monitoring a practical twofactor authentication PassWindow system in its application to the banking system.
Науковий журнал «Радіоелектроніка, інформатика, управління»
Переглянути архів ІнформаціяПоле | Співвідношення | |
##plugins.schemas.marc.fields.042.name## |
dc |
|
##plugins.schemas.marc.fields.720.name## |
Evseev, S. P.; Department of Simon Kuznets Kharkiv National University of Economics, Kharkiv, Ukraine Tomashevskyy, B. P.; Department of Simon Kuznets Kharkiv National University of Economics, Kharkiv, Ukraine |
|
##plugins.schemas.marc.fields.520.name## |
The article considers basic methods of two-factor authentication system constructing on the basis of the use of cryptographic mechanisms<br />to ensure the reliability, of formed authenticators, the risk of various methods of online attacks against a variety of two-factor authentication<br />systems is estimated, as well as a system PassWindow is considered, which provides two-factor authentication on the unique ability of the<br />matrix to transmit information in such a way that it is deciphered only to the imposition of the physical signs of the intended recipient pattern<br />and barcode pattern obtained by digital network devices, resistance to the analysis is provided by a unique barcode card pattern generation as<br />unique statistical images, a sequence of characters, or as more extended in an animated version. The object of the research is the process of improving the integrity and authenticity of data packets in banking transactions security protocols on the basis of two-factor authentication methods. The subject of the study is methods and algorithms of integrity control and authenticity of data packets in banking transaction security protocols on the basis of two-factor authentication methods. The aim of the paper is to increase the integrity and authenticity of data packets in banking transactions security protocols, a banking transaction, threat assessment on two-factor authentication methods. A comparative analysis of various systems with two-factor authentication PassWindow system in opposition to various Internet attack scenario is being carried out. An effective method for monitoring a practical twofactor authentication PassWindow system in its application to the banking system. |
|
##plugins.schemas.marc.fields.260.name## |
Zaporizhzhya National Technical University 2015-06-23 10:32:00 |
|
##plugins.schemas.marc.fields.856.name## |
application/pdf http://ric.zntu.edu.ua/article/view/45136 |
|
##plugins.schemas.marc.fields.786.name## |
Radio Electronics, Computer Science, Control; No 1 (2015): Radio Electronics, Computer Science, Control |
|
##plugins.schemas.marc.fields.546.name## |
en |
|
##plugins.schemas.marc.fields.540.name## |
Copyright (c) 2015 S. P. Evseev, B. P. Tomashevskyy |
|