[1]
Яремчук, Ю.Є. 2014. Possibilities for authentication of the interaction parties based on recurrent sequences. Ukrainian Information Security Research Journal. 15, 4 (Feb. 2014), 394–378. DOI:https://doi.org/10.18372/2410-7840.15.5509.