Axborot texnologiyalari, tarmoqlar va telekommunikatsiyalar


Foydalanilgan adabiyotlar



Download 5,02 Mb.
Pdf ko'rish
bet159/222
Sana15.11.2022
Hajmi5,02 Mb.
#866857
1   ...   155   156   157   158   159   160   161   162   ...   222
Foydalanilgan adabiyotlar 
1.
 
What is multifactor authentication (MFA) and how does it work? 
(techtarget.com) 
16.04.2022 
11:36
2.
 
What is multifactor authentication (MFA) and how does it work? 
(techtarget.com) 
16.04.2022 
12:28
3.
 
https://www.mdpi.com/2410- 
387X/2/1/1/htm#:~:text=Today%2C%20three%20types,or%20behavior%20p 
attern

17.04.2022 
17:10
4.
 
https://www.mdpi.com/cryptography/cryptography-02- 
00001/article_deploy/html/images/cryptography-02-00001-g001.png 
17.04.2022 
10:21
5.
 
https://www.mdpi.com/cryptography/cryptography-02- 
00001/article_deploy/html/images/cryptography-02-00001-g002-550.jpg 
17.04.2022 
10:28
6.
 
https://www.mdpi.com/2410- 
387X/2/1/1/htm#:~:text=Customers%20first%20register,the%20MFA%20fai 
ls

17.04.202212:46
Hozirgi vaqtda MFAning asosiy muammolaridan biri foydalanuvchi 


International scientific conference "INFORMATION TECHNOLOGIES, NETWORKS AND 
TELECOMMUNICATIONS" ITN&T-2022 Urgench, 2022y April 29-30 
571 
RESEARCH ON AUTHENTICATION METHODS 
Rajabboyeva S.B.
1
, Xalmuratov O.U,
2
 Rajapboyeva S.B.
3
 
1
Master student of UbTUIT, 
surayyobaxromqizi@gmail.com 
2
Deputy direktor of UbTUIT 
3
 Bachelor student of UbTUIT 
 
Abstract
With the rapid growth of networked systems and applications 
such as e-commerce, the demand for effective computer security is increasing. 
Most computer systems are protected through a process of user identification and 
authentication. While identification is usually non-private information provided by 
users to identify themselves and can be known by system administrators and other 
system users, authentication provides secret, private user information which can 
authenticate their identity. There are various authentication approaches and 
techniques, from passwords to public keys. This article presents the three main 
authentication approaches, their technology and implementation issues, and the 
factors to be considered when choosing an authentication method. 

Download 5,02 Mb.

Do'stlaringiz bilan baham:
1   ...   155   156   157   158   159   160   161   162   ...   222




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish