1.
Швець ВА, Шестакова ВВ. Using the fingerprint to the elliptic curve cryptosystems. Bezpeka ìnf. [Internet]. 2012 Jun. 15 [cited 2026 Feb. 2];17(1):64-7. Available from: https://jrnl.nau.edu.ua/index.php/Infosecurity/article/view/3394