1. Requirements for authentication systems according to severity levels;Sabanov;Polzunovsky Vestn.,2012
2. Embedding cryptographic functions in a communication system with limited resources;Rososhek;Inf. Secur. Issues,2004
3. Reliability characteristics of distributed cryptographic information-telecommunication systems with limited resources;Mesheryakov;Comput. Technol.,2007
4. Conceptual Issues of Information Security of the Region and Training
5. Classification of techniques for the production of computer-technical expertise using the graph theory approach;Smolina;IT Secur.,2016