Two-factor Authorization in Linux
Identification and authentication realization in OS Linux on basis of external USB-device and on basis of PAM-module program realization by the example answer on control question (enigma) is considered.
Main Authors: | L. S. Nosov, A. S. Popov |
---|---|
Format: | Article |
Language: | English |
Published: |
Joint Stock Company "Experimental Scientific and Production Association SPELS
2010-03-01
|
Series: | Безопасность информационных технологий |
Subjects: | |
Online Access: | https://bit.mephi.ru/index.php/bit/article/view/782 |
Similar Items
-
Using Linux /
by: 248993 Tackett, Jack, et al.
Published: (1997) -
Using Linux /
by: 248993 Tackett, Jack, et al.
Published: (1995) -
Using Linux / [cakera padat]
by: 248993 Tackett, Jack, et al.
Published: (1997) -
Using Linux / [cakera padat]
by: 248993 Tackett, Jack, et al.
Published: (1995) -
Official red hat linux user's guide /
by: Moore, Sandra A., et al.
Published: (2003)