|
|
Publications in Math-Net.Ru |
Citations |
|
2010 |
1. |
P. A. Pautov, “Authentication in multi-tier system using commutative encryption”, Prikl. Diskr. Mat., 2010, no. supplement № 3, 59–60 |
2. |
P. A. Pautov, “Authentication in multi-tier systems using proxy signatures”, Prikl. Diskr. Mat., 2010, no. 4(10), 18–22 |
3. |
P. A. Pautov, “Authentication in trusted subsystem model using commutative encryption”, Prikl. Diskr. Mat., 2010, no. 3(9), 90–95 |
1
|
|
2009 |
4. |
P. A. Pautov, “Implementation of a method for protecting credentials in the multi-tier applications”, Prikl. Diskr. Mat., 2009, no. supplement № 1, 50–51 |
1
|
5. |
P. A. Pautov, “The implementation of the DBMS credentials protection method in the web applications”, Prikl. Diskr. Mat., 2009, no. 3(5), 100–105 |
|
2008 |
6. |
P. A. Pautov, “The problem of authentication in the multi-tier applications”, Prikl. Diskr. Mat., 2008, no. 2(2), 87–90 |
5
|
|
Organisations |
|
|