[1]
Швець, В.А. and Шестакова, В.В. 2012. Using the fingerprint to the elliptic curve cryptosystems. Ukrainian Scientific Journal of Information Security. 17, 1 (Jun. 2012), 64–67. DOI:https://doi.org/10.18372/2225-5036.17.3394.