Sun’iy intelekt, axborot xavfsizligi texnikasi va texnologiyalari
Международная научно-техническая конференция «Практическое применение технических и
цифровых технологий и их инновационных решений», ТАТУФФ, Фергана, 4 мая 2023 г.
457
Xulosa
Xulosa qilib aytadigan bo'lsak, bir martalik parollar va boshqa
autentifikatsiya algoritmlari raqamli xavfsizlikni ta'minlashning muhim
vositalaridir. Ko'rib turganimizdek, bir martalik parol algoritmlarining bir necha
turlari mavjud bo'lib, ularning har biri o'zining kuchli va zaif tomonlariga ega.
Foydalanilgan adabiyotlar
1.
Roger
Elrod,East
Carolina
University,Summer
2005,DTEC
6870,Semester Project,Due: July 17,05.
2.
White Paper: Options for Two Factor Authentication, Authors:
Andrew Kemshall, Phil Underwood, Date: July 2007
3.
Two-Factor Authentication or How to Potentially Counterfeit
Experimental Results in Biometric Systems
_
Christian Rathgeb and
Andreas Uhl, University of Salzburg, Department of Computer
Sciences, A-5020 Salzburg, Austria, crathgeb, uhl@cosy.sbg.ac.at.
4.
Cryptography and network security,Behrouz A Forouzan,Debdeep
Mukherjee, 2nd Ed.