{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T02:54:01Z","timestamp":1771037641125,"version":"3.50.1"},"reference-count":157,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2019,1,29]],"date-time":"2019-01-29T00:00:00Z","timestamp":1548720000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100003443","name":"Ministry of Education and Science of the Russian Federation","doi-asserted-by":"publisher","award":["2.8172.2017\/8.9 (TUSUR)"],"award-info":[{"award-number":["2.8172.2017\/8.9 (TUSUR)"]}],"id":[{"id":"10.13039\/501100003443","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"<jats:p>In Tomsk University of Control Systems and Radioelectronics (TUSUR) one of the main areas of research is information security. The work is carried out by a scientific group under the guidance of Professor Shelupanov. One of the directions is the development of a comprehensive approach to assessing the security of the information systems. This direction includes the construction of an information security threats model and a protection system model, which allow to compile a complete list of threats and methods of protection against them. The main directions of information security tools development are dynamic methods of biometrics, methods for generating prime numbers for data encryption, steganography, methods and means of data protection in Internet of Things (IoT) systems. The article presents the main results of research in the listed areas of information security. The resultant properties in symmetric cryptography are based on the properties of the power of the generating functions. The authors have obtained symmetric principles for the development of primality testing algorithms, as discussed in the Appendix.<\/jats:p>","DOI":"10.3390\/sym11020150","type":"journal-article","created":{"date-parts":[[2019,1,29]],"date-time":"2019-01-29T11:27:52Z","timestamp":1548761272000},"page":"150","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":21,"title":["Information Security Methods\u2014Modern Research Directions"],"prefix":"10.3390","volume":"11","author":[{"given":"Alexander","family":"Shelupanov","sequence":"first","affiliation":[{"name":"Department of Security, Tomsk State University of Control Systems and Radioelectronics, 40 Lenina Prospect, 634050 Tomsk, Russia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8257-2082","authenticated-orcid":false,"given":"Oleg","family":"Evsyutin","sequence":"additional","affiliation":[{"name":"Department of Security, Tomsk State University of Control Systems and Radioelectronics, 40 Lenina Prospect, 634050 Tomsk, Russia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3222-9956","authenticated-orcid":false,"given":"Anton","family":"Konev","sequence":"additional","affiliation":[{"name":"Department of Security, Tomsk State University of Control Systems and Radioelectronics, 40 Lenina Prospect, 634050 Tomsk, Russia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8000-2716","authenticated-orcid":false,"given":"Evgeniy","family":"Kostyuchenko","sequence":"additional","affiliation":[{"name":"Department of Security, Tomsk State University of Control Systems and Radioelectronics, 40 Lenina Prospect, 634050 Tomsk, Russia"}]},{"given":"Dmitry","family":"Kruchinin","sequence":"additional","affiliation":[{"name":"Department of Security, Tomsk State University of Control Systems and Radioelectronics, 40 Lenina Prospect, 634050 Tomsk, Russia"}]},{"given":"Dmitry","family":"Nikiforov","sequence":"additional","affiliation":[{"name":"Department of Security, Tomsk State University of Control Systems and Radioelectronics, 40 Lenina Prospect, 634050 Tomsk, Russia"}]}],"member":"1968","published-online":{"date-parts":[[2019,1,29]]},"reference":[{"key":"ref_1","first-page":"61","article-title":"Requirements for authentication systems according to severity levels","volume":"2","author":"Sabanov","year":"2012","journal-title":"Polzunovsky Vestn."},{"key":"ref_2","first-page":"22","article-title":"Embedding cryptographic functions in a communication system with limited resources","volume":"2","author":"Rososhek","year":"2004","journal-title":"Inf. Secur. Issues"},{"key":"ref_3","first-page":"62","article-title":"Reliability characteristics of distributed cryptographic information-telecommunication systems with limited resources","volume":"12","author":"Mesheryakov","year":"2007","journal-title":"Comput. Technol."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"136","DOI":"10.15622\/sp.34.7","article-title":"Conceptual Issues of Information Security in the Region and Training of Staff","volume":"3","author":"Mesheryakov","year":"2014","journal-title":"Spiiras Proc."},{"key":"ref_5","first-page":"73","article-title":"Classification of techniques for the production of computer-technical expertise using the graph theory approach","volume":"2","author":"Smolina","year":"2016","journal-title":"IT Secur."},{"key":"ref_6","first-page":"31","article-title":"Technique of carrying out the preparatory stage of the research in the production of computer-technical expertise","volume":"19","author":"Smolina","year":"2016","journal-title":"Rep. Tusur"},{"key":"ref_7","first-page":"15","article-title":"Approaches and criteria for assessing information security risks","volume":"4","author":"Prishep","year":"2007","journal-title":"IT Secur."},{"key":"ref_8","first-page":"39","article-title":"Methodology of formation of threats to the security of confidential information in uncertain conditions of their occurrence","volume":"12","author":"Mironova","year":"2012","journal-title":"Izv. Sfedutechnical Sci."},{"key":"ref_9","unstructured":"Agarwal, A. (2018, October 24). Threat Modeling\u2014Data Flow Diagram vs. Process Flow Diagram. Available online: https:\/\/www.peerlyst.com\/posts\/threat-modeling-data-flow-diagram-vs-process-flow-diagram-anurag-agarwal."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"805856","DOI":"10.1155\/2014\/805856","article-title":"Automating Risk Analysis of Software Design Models","volume":"2014","author":"Frydman","year":"2014","journal-title":"Sci. World J."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"4621587","DOI":"10.1155\/2017\/4621587","article-title":"PMCAP: A Threat Model of Process Memory Data on the Windows Operating System","volume":"2017","author":"Pan","year":"2017","journal-title":"Secur. Commun. Netw."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"4945152","DOI":"10.1155\/2018\/4945152","article-title":"A Clustering K-Anonymity Privacy-Preserving Method for Wearable IoT Devices","volume":"2018","author":"Liu","year":"2018","journal-title":"Secur. Commun. Netw."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"6562953","DOI":"10.1155\/2017\/6562953","article-title":"Authentication Protocols for Internet of Things: A Comprehensive Survey","volume":"2017","author":"Ferrag","year":"2017","journal-title":"Secur. Commun. Netw."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Wagner, T.D., Palomar, E., Mahbub, K., and Abdallah, A.E. (2017). Relevance Filtering for Shared Cyber Threat Intelligence (Short Paper). Information Security Practice and Experience, Springer.","DOI":"10.1007\/978-3-319-72359-4_35"},{"key":"ref_15","first-page":"18","article-title":"Creation of the adaptive cyber threat detection system on the basis of fuzzy feature clustering","volume":"2","author":"Lakhno","year":"2016","journal-title":"East. Eur. J. Enterp. Technol."},{"key":"ref_16","unstructured":"Bodeau, D.J., and McCollum, C.D. (2018). System-of-Systems Threat Model."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"627","DOI":"10.1016\/j.procs.2017.08.314","article-title":"Towards Composable Threat Assessment for Medical IoT (MIoT)","volume":"113","author":"Darwisha","year":"2017","journal-title":"Procedia Comput. Sci."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"8740217","DOI":"10.1155\/2017\/8740217","article-title":"Quantitative Analysis of the Security of Software-Defined Network Controller Using Threat\/Effort Model","volume":"2017","author":"Wu","year":"2017","journal-title":"Math. Probl. Eng."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Luh, R., Temper, M., Tjoa, S., and Schrittwieser, S. (2018, January 22\u201324). APT RPG: Design of a Gamified Attacker\/Defender Meta Model. Proceedings of the 4th International Conference on Information Systems Security and Privacy (ICISSP 2018), Madeira, Portugal.","DOI":"10.5220\/0006717805260537"},{"key":"ref_20","unstructured":"Aydin, M.M. (2016). Engineering Threat Modelling Tools for Cloud Computing, University of York Computer Science."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Alhebaishi, N., Wang, L., Jajodia, S., and Singhal, A. (2016). Threat Modeling for Cloud Data Center Infrastructures. International Symposium on Foundations and Practice of Security, Springer.","DOI":"10.1007\/978-3-319-51966-1_20"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Johnson, P., Vernotte, A., Ekstedt, M., and Lagerstr\u00f6m, R. (September, January 31). pwnPr3d: An Attack-Graph-Driven Probabilistic Threat-Modeling Approach. Proceedings of the 2016 11th International Conference on Availability, Reliability and Security (ARES), Salzburg, Austria.","DOI":"10.1109\/ARES.2016.77"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"S3","DOI":"10.1016\/j.diin.2015.05.002","article-title":"Graph-theoretic characterization of cyber-threat infrastructures","volume":"14","author":"Boukhtouta","year":"2015","journal-title":"Digit. Investig."},{"key":"ref_24","first-page":"107","article-title":"Approach to the description of the structure of the information security system","volume":"2","author":"Konev","year":"2013","journal-title":"Rep. Tusur"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1016\/j.procs.2017.01.053","article-title":"System Integration and Security of Information Systems","volume":"104","author":"Boiko","year":"2017","journal-title":"Procedia Comput. Sci."},{"key":"ref_26","unstructured":"Xuezhong, L., and Zengliang, L. (2008, January 12\u201314). Evaluating Method of Security Threat Based on Attacking-Path Graph Model. Proceedings of the 2008 International Conference on Computer Science and Software Engineering, Hubei, China."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1016\/j.cose.2015.08.004","article-title":"The information systems\u2019 security level assessment model based on an ontology and evidential reasoning approach","volume":"55","author":"Solic","year":"2015","journal-title":"Comput. Secur."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Jouini, M., and Rabai, L. (2016, January 20\u201322). A Scalable Threats Classification Model in Information Systems. Proceedings of the 9th International Conference on Security of Information and Networks (SIN\u201916), Newark, NJ, USA.","DOI":"10.1145\/2947626.2947630"},{"key":"ref_29","unstructured":"Konev, A., Shelupanov, A., and Egoshin, N. (2018, January 18\u201325). Functional Scheme of the Process of Access Contro. Proceedings of the 3rd Russian-Pacific Conference on Computer Technology and Applications (RPC), Vladivostok, Russia."},{"key":"ref_30","first-page":"34","article-title":"Approach to building a model of threats to protected information","volume":"1","author":"Konev","year":"2012","journal-title":"Rep. Tusur"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"060015","DOI":"10.1063\/1.4964595","article-title":"Mathematical model of threats to information systems","volume":"1772","author":"Novokhrestov","year":"2016","journal-title":"AIP Conf. Proc."},{"key":"ref_32","unstructured":"Hettiarachchi, S., and Wickramasinghe, S. (2018, October 20). Study to Identify Threats to Information Systems in Organizations and Possible Countermeasures through Policy Decisions and Awareness Programs to Ensure the Information Security. Available online: http:\/\/www.academia.edu\/28512865\/Study_to_identify_threats_to_Information_Systems_in_organizations_and_possible_countermeasures_through_policy_decisions_and_awareness_programs_to_ensure_the_information_security."},{"key":"ref_33","unstructured":"Chaula, J.A., Yngstr\u00f6m, L., and Kowalski, S. (2018, October 14). Security Metrics and Evaluation of Information Systems Security. Available online: https:\/\/pdfs.semanticscholar.org\/f2bb\/401cb3544f4ddeb12161cd4dfcd8ef99613f.pdf."},{"key":"ref_34","unstructured":"Basu, A., and Blanning, R. (2007). Metagraphs and Their Applications, Springer."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"489","DOI":"10.1016\/j.procs.2014.05.452","article-title":"Classification of security threats in information systems","volume":"32","author":"Jouini","year":"2014","journal-title":"Procedia Comput. Sci."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"513","DOI":"10.1007\/978-981-13-0212-1_53","article-title":"A survey of fingerprint recognition systems and their applications","volume":"500","author":"Prasad","year":"2019","journal-title":"Lect. Notes Electr. Eng."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1007\/978-981-13-0212-1_28","article-title":"Image enhancement for fingerprint recognition using Otsu\u2019s method","volume":"500","author":"Prasad","year":"2019","journal-title":"Lect. Notes Electr. Eng."},{"key":"ref_38","first-page":"361","article-title":"Polyvalent fingerprint biometric system for authentication. Smart Innovation","volume":"111","author":"Azizi","year":"2019","journal-title":"Syst. Technol."},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Shaheed, K., Liu, H., Yang, G., Qureshi, I., Gou, J., and Yin, Y. (2018). A Systematic Review of Finger Vein Recognition Techniques. Information, 9.","DOI":"10.3390\/info9090213"},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"U\u00e7an, O.N., Bayat, O., and \u00c7o\u015fkun, M.B. (2017, January 21\u201323). Development and evaluation of the authentication systems by using phase-only correlation palm print identificaton methods. Proceedings of the 2017 International Conference on Engineering and Technology (ICET), Antalya, Turkey.","DOI":"10.1109\/ICEngTechnol.2017.8308200"},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Shelton, J., Rice, C., Singh, J., Jenkins, J., Dave, R., Roy, K., and Chakraborty, S. (2018, January 6\u20137). Palm Print Authentication on a Cloud Platform. Proceedings of the 2018 International Conference on Advances in Big Data, Computing and Data Communication Systems, icABCD 2018, Durban, South Africa.","DOI":"10.1109\/ICABCD.2018.8465479"},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1007\/978-981-10-8639-7_21","article-title":"Palmprint identification and verification system based on euclidean distance and 2d locality preserving projection method","volume":"707","author":"Ali","year":"2019","journal-title":"Adv. Intell. Syst. Comput."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"861629","DOI":"10.1155\/2015\/861629","article-title":"Personal Authentication Using Multifeatures Multispectral Palm Print Traits","volume":"2015","author":"Rajagopal","year":"2015","journal-title":"Sci. World J."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"1814","DOI":"10.3844\/jcssp.2012.1814.1821","article-title":"A hybrid model for human recognition system using hand dorsum geometry and finger-knuckle-print","volume":"8","author":"Mathivanan","year":"2012","journal-title":"J. Comput. Sci."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1016\/j.knosys.2016.04.008","article-title":"An accurate infrared hand geometry and vein pattern based authentication system","volume":"103","author":"Gupta","year":"2016","journal-title":"Knowl. Based Syst."},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Burgues, J., Fierrez, J., Ramos, D., and Ortega-Garcia, J. (2009). Comparison of distance-based features for hand geometry authentication. European Workshop on Biometrics and Identity Management, Springer.","DOI":"10.1007\/978-3-642-04391-8_42"},{"key":"ref_47","unstructured":"Tsapatsoulis, N., and Pattichis, C. (2009, January 23\u201325). Palm geometry biometrics: A score-based fusion approach. Proceedings of the AIAI-2009 Workshops, Thessaloniki, Greece."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1016\/j.patcog.2017.08.017","article-title":"User authorization based on hand geometry without special equipment","volume":"73","author":"Klonowski","year":"2018","journal-title":"Pattern Recognit."},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Yuan, X., Gu, L., Chen, T., Elhoseny, M., and Wang, W. (2018, January 26\u201329). A fast and accurate retina image verification method based on structure similarity. Proceedings of the 2018 IEEE Fourth International Conference on Big Data Computing Service and Applications (BigDataService), Bamberg, Germany.","DOI":"10.1109\/BigDataService.2018.00034"},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"679","DOI":"10.1007\/978-981-13-1580-0_65","article-title":"A powerful artificial intelligence-based authentication mechanism of retina template using sparse matrix representation with high security","volume":"815","author":"Rani","year":"2019","journal-title":"Adv. Intell. Syst. Comput."},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Poosarala, A., and Jayashree, R. (2018, January 27\u201329). Uniform classifier for biometric ear and retina authentication using smartphone application. Proceedings of the 2nd International Conference on Vision, Image and Signal Processing, Las Vegas, NV, USA.","DOI":"10.1145\/3271553.3271618"},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"012006","DOI":"10.1088\/1757-899X\/124\/1\/012006","article-title":"Software and hardware user authentication methods in the information and control systems based on biometrics","volume":"124","author":"Boriev","year":"2016","journal-title":"IOP Conf. Ser. Mater. Sci. Eng."},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"521","DOI":"10.1007\/978-981-13-0212-1_54","article-title":"Iris recognition systems: A review","volume":"500","author":"Prasad","year":"2019","journal-title":"Lect. Notes Electr. Eng."},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1088\/1757-899X\/226\/1\/012110","article-title":"Reducing Error Rates for Iris Image using higher Contrast in Normalization process","volume":"226","author":"Ghali","year":"2017","journal-title":"IOP Conf. Ser. Mater. Sci. Eng."},{"key":"ref_55","doi-asserted-by":"crossref","unstructured":"Haware, S., and Barhatte, A. (2017). Retina Based Biometric Identification Using SURF and ORB Feature Descriptors, IEEE.","DOI":"10.1109\/ICMDCS.2017.8211697"},{"key":"ref_56","doi-asserted-by":"crossref","unstructured":"Yaman, M.A., Subasi, A., and Rattay, F. (2018). Comparison of Random Subspace and Voting Ensemble Machine Learning Methods for Face Recognition. Symmetry, 10.","DOI":"10.3390\/sym10110651"},{"key":"ref_57","doi-asserted-by":"crossref","unstructured":"Galterio, M.G., Shavit, S.A., and Hayajneh, T. (2018). A Review of Facial Biometrics Security for Smart Devices. Computers, 7.","DOI":"10.3390\/computers7030037"},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"458","DOI":"10.1007\/978-3-030-03314-9_39","article-title":"A Method of Feature Vector Modification in Keystroke Dynamics","volume":"889","author":"Omieljanowicz","year":"2019","journal-title":"Adv. Intell. Syst. Comput."},{"key":"ref_59","doi-asserted-by":"crossref","unstructured":"Smriti, P., Srivastava, S., and Singh, S. (2018, January 9\u201310). Keyboard Invariant Biometric Authentication. Proceedings of the 2018 4th International Conference on Computational Intelligence & Communication Technology (CICT), Ghaziabad Uttar Pradesh, India.","DOI":"10.1109\/CIACT.2018.8480337"},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1007\/978-3-030-01821-4_8","article-title":"On continuous user authentication via hidden free-text based monitoring","volume":"875","author":"Kochegurova","year":"2019","journal-title":"Adv. Intell. Syst. Comput."},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"564","DOI":"10.1016\/j.procs.2018.08.209","article-title":"Keystroke Dynamic Classification using Machine Learning for Password Authorization","volume":"135","author":"Muliono","year":"2018","journal-title":"Procedia Comput. Sci."},{"key":"ref_62","doi-asserted-by":"crossref","unstructured":"Khalifa, A.A., Hassan, M.A., Khalid, T.A., and Hamdoun, H. (2015, January 7\u20139). Comparison between mixed binary classification and voting technique for active user authentication using mouse dynamics. Proceedings of the 2015 International Conference on Computing, Control, Networking, Electronics and Embedded Systems Engineering (ICCNEEE), Khartoum, Sudan.","DOI":"10.1109\/ICCNEEE.2015.7381378"},{"key":"ref_63","doi-asserted-by":"crossref","unstructured":"Lozhnikov, P.S., and Sulavko, A.E. (2017). Usage of quadratic form networks for users\u2019 recognition by dynamic biometrie images. Dynamics of Systems, Mechanisms and Machines (Dynamics), IEEE.","DOI":"10.1109\/Dynamics.2017.8239480"},{"key":"ref_64","doi-asserted-by":"crossref","first-page":"7811","DOI":"10.1007\/s00500-018-3477-2","article-title":"Online handwritten signature verification using feature weighting algorithm relief","volume":"22","author":"Yang","year":"2018","journal-title":"Soft Comput."},{"key":"ref_65","doi-asserted-by":"crossref","unstructured":"Jimenez, A., and Raj, B. (2018, January 4\u20137). A two factor transformation for speaker verification through \u21131 comparison. Proceedings of the 2017 IEEE Workshop on Information Forensics and Security (WIFS), Rennes, France.","DOI":"10.1109\/WIFS.2017.8267661"},{"key":"ref_66","doi-asserted-by":"crossref","first-page":"496","DOI":"10.1109\/TASLP.2018.2882731","article-title":"Privacy-preserving ivector-based speaker verification","volume":"27","author":"Rahulamathavan","year":"2019","journal-title":"IEEE\/ACM Trans. Audio Speech Lang. Process."},{"key":"ref_67","doi-asserted-by":"crossref","unstructured":"Todkar, S.P., Babar, S.S., Ambike, R.U., Suryakar, P.B., and Prasad, J.R. (2018, January 6\u20137). Speaker Recognition Techniques: A Review. Proceedings of the 2018 3rd International Conference for Convergence in Technology, I2CT 2018, Pune, India.","DOI":"10.1109\/I2CT.2018.8529519"},{"key":"ref_68","doi-asserted-by":"crossref","first-page":"40120","DOI":"10.1109\/ACCESS.2018.2854960","article-title":"Human Abnormal Behavior Impact on Speaker Verification Systems","volume":"6","author":"Tovarek","year":"2018","journal-title":"IEEE Access"},{"key":"ref_69","doi-asserted-by":"crossref","unstructured":"Sharifi, O., and Eskandari, M. (2016). Optimal Face-Iris Multimodal Fusion Scheme. Symmetry, 8.","DOI":"10.3390\/sym8060048"},{"key":"ref_70","doi-asserted-by":"crossref","unstructured":"Chee, K., Jin, Z., Yap, W., and Goi, B. (2017, January 12\u201315). Two-dimensional winner-takes-all hashing in template protection based on fingerprint and voice feature level fusion. Proceedings of the 2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC), Kuala Lumpur, Malaysia.","DOI":"10.1109\/APSIPA.2017.8282253"},{"key":"ref_71","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1007\/978-981-13-1135-2_42","article-title":"Multimodal Biometric Authentication System Using Hand Shape, Palm Print, and Hand Geometry","volume":"799","author":"Jaswal","year":"2019","journal-title":"Adv. Intell. Syst. Comput."},{"key":"ref_72","doi-asserted-by":"crossref","first-page":"9777","DOI":"10.1109\/TIE.2018.2823686","article-title":"Multibiometric authentication system using slap fingerprints, palm dorsal vein, and hand geometry","volume":"65","author":"Gupta","year":"2018","journal-title":"IEEE Trans. Ind. Electron."},{"key":"ref_73","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1016\/j.jnca.2018.04.013","article-title":"An alignment-free cancelable fingerprint template for bio-cryptosystems","volume":"115","author":"Alam","year":"2018","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_74","doi-asserted-by":"crossref","unstructured":"Yang, J., Sun, W., Liu, N., Chen, Y., Wang, Y., and Han, S. (2018). A Novel Multimodal Biometrics Recognition Model Based on Stacked ELM and CCA Methods. Symmetry, 10.","DOI":"10.3390\/sym10040096"},{"key":"ref_75","doi-asserted-by":"crossref","unstructured":"Kaur, T., and Kaur, M. (2017, January 10\u201312). Cryptographic key generation from multimodal template using fuzzy extractor. Proceedings of the 2017 Tenth International Conference on Contemporary Computing (IC3), Noida, India.","DOI":"10.1109\/IC3.2017.8284321"},{"key":"ref_76","doi-asserted-by":"crossref","unstructured":"Murugan, C.A., and KarthigaiKumar, P. (2018). Survey on Image Encryption Schemes, Bio cryptography and Efficient Encryption Algorithms. Mob. Netw. Appl.","DOI":"10.1007\/s11036-018-1058-3"},{"key":"ref_77","doi-asserted-by":"crossref","first-page":"36939","DOI":"10.1109\/ACCESS.2018.2844182","article-title":"Securing Mobile Healthcare Data: A Smart Card Based Cancelable Finger-Vein Bio-Cryptosystem","volume":"6","author":"Yang","year":"2018","journal-title":"IEEE Access"},{"key":"ref_78","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1016\/j.patcog.2016.10.035","article-title":"Cancellable iris template generation based on Indexing-First-One hashing","volume":"64","author":"Lai","year":"2017","journal-title":"Pattern Recognit."},{"key":"ref_79","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1016\/j.patcog.2017.10.041","article-title":"Cancellable speech template via random binary orthogonal matrices projection hashing","volume":"76","author":"Chee","year":"2018","journal-title":"Pattern Recognit."},{"key":"ref_80","unstructured":"Shelupanov, A.A., Gruzdev, S.L., and Nahaev, Y.S. (2012). Authentication. Theory and practice of providing secure access to information resources. Textbook for High Schools, Hot Line-Telecom. [2nd ed.]."},{"key":"ref_81","first-page":"37","article-title":"Password protection: Past, present, future","volume":"9","author":"Bezmaliy","year":"2008","journal-title":"Comput. Press"},{"key":"ref_82","unstructured":"Popov, M. (2002). Biometric Security Systems, BDI, Institute of Economic Security."},{"key":"ref_83","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1016\/j.patcog.2003.12.021","article-title":"A deformable model for fingerprint matching","volume":"38","author":"Ross","year":"2005","journal-title":"J. Pattern Recognit."},{"key":"ref_84","unstructured":"Matsumoto, T., Hoshino, H., Yamada, K., and Hasino, S. (2002, January 23\u201325). Impact of artificial gummy fingers on fingerprint systems. Proceedings of the Optical Security and Counterfeit Deterrence Techniques IV, San Jose, CA, USA."},{"key":"ref_85","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1109\/TIFS.2006.873653","article-title":"Biometric: A Tool for Information Security","volume":"1","author":"Jain","year":"2006","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_86","unstructured":"Kukula, E., and Elliott, S. (2001, January 11\u201314). Implementation of Hand Geometry at Purdue University\u2019s Recreational Center: An Analysis of User Perspectives and System Performance. Proceedings of the 35th Annual International Carnahan Conference on Security Technology, Las Palmas, Spain."},{"key":"ref_87","doi-asserted-by":"crossref","unstructured":"Kumar, A., Wong, D.C., Shen, H.C., and Jain, A.K. (2003, January 9\u201311). Personal Verification using Palmprint and Hand Geometry Biometric. Proceedings of the 4th International Conference on Audio- and Video-based Biometric Person Authentication, Guildford, UK.","DOI":"10.1007\/3-540-44887-X_78"},{"key":"ref_88","unstructured":"(2017, December 29). The distributed System of Recognition of Persons on the Basis of Geometrical Characteristics. Available online: http:\/\/masters.donntu.org\/2010\/fknt\/kolesnik\/library\/tez1.htm."},{"key":"ref_89","unstructured":"Ganorkar, S.R., and Ghatol, A.A. (2007, January 16\u201319). Iris Recognition: An Emerging Biometric Technology. Proceedings of the 6th WSEAS International Conference on Signal Processing, Robotics and Automation, Elounda, Corfu, Greece."},{"key":"ref_90","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1007\/s10044-005-0022-6","article-title":"Personal authentication using digital retinal images","volume":"9","author":"Marino","year":"2006","journal-title":"J. Pattern Anal. Appl."},{"key":"ref_91","unstructured":"Favata, J.T., Srikantan, G., and Srihari, S.N. (1994, January 7\u20139). Handprinted character digit recognition using a multiple resolution. Proceedings of the IWFHR-1994, Taipei, Taiwan."},{"key":"ref_92","first-page":"219","article-title":"Authentication system based on the dynamics of the handwritten signature","volume":"2","author":"Doroshenko","year":"2014","journal-title":"Rep. Tusur"},{"key":"ref_93","unstructured":"Rakhmanenko, I.A. (2015, January 25\u201327). Study formants and chalk-cepstral coefficients as a vector of signs for the task of identification by voice. Proceedings of the Electronic means and control systems, Tomsk, Russia."},{"key":"ref_94","doi-asserted-by":"crossref","first-page":"116","DOI":"10.13176\/11.427","article-title":"Biometric Authentication and Identification Using Keystroke Dynamics: A Survey","volume":"7","author":"Banerjee","year":"2012","journal-title":"J. Pattern Recognit. Res."},{"key":"ref_95","first-page":"1","article-title":"Dynamic authentication based on the analysis of the keyboard handwriting","volume":"32","author":"Shirochin","year":"1999","journal-title":"Visnyk Ntuu \u201cKpi\u201d Inform. Oper. Comput. Sci."},{"key":"ref_96","first-page":"39","article-title":"Identification by biometric parameters when using the apparatus of neural networks","volume":"7","author":"Kostyuchenko","year":"2007","journal-title":"Neurocomput. Dev. Appl."},{"key":"ref_97","unstructured":"Gorbunov, I.V. (2014). Algorithms and Software for Identification of Pareto-Optimal Fuzzy Systems Based on Meta-Heuristic Methods, TUSUR."},{"key":"ref_98","unstructured":"Kostyuchenko, E., Krivonosov, E., and Shelupanov, A. (2017, January 20\u201321). Integrated approach to user authentication based on handwritten signature. Proceedings of the CEUR, Delmenhorst, Germany."},{"key":"ref_99","doi-asserted-by":"crossref","first-page":"620","DOI":"10.1007\/978-3-319-40663-3_71","article-title":"Integration of the Bayesian classifier and perceptron for problem identification on dynamics, using a genetic algorithm for the identification threshold selection","volume":"9719","author":"Gurakov","year":"2016","journal-title":"Lect. Notes Comput. Sci."},{"key":"ref_100","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","article-title":"A Method for Obtaining Digital Signatures and Public-Key Cryptosystems","volume":"21","author":"Rivest","year":"1978","journal-title":"Commun. ACM"},{"key":"ref_101","doi-asserted-by":"crossref","first-page":"206","DOI":"10.1007\/978-3-319-66402-6_13","article-title":"Non-interactive provably secure attestations for arbitrary RSA prime generation algorithms","volume":"10492","author":"Benhamouda","year":"2017","journal-title":"Lect. Notes Comput. Sci."},{"key":"ref_102","first-page":"2273","article-title":"RSA encryption using three Mersenne primes","volume":"14","author":"Padmaja","year":"2016","journal-title":"Int. J. Chem. Sci."},{"key":"ref_103","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1016\/j.jnt.2016.04.022","article-title":"Primes in quadratic unique factorization domains","volume":"168","author":"Vaskouski","year":"2016","journal-title":"J. Number Theory"},{"key":"ref_104","doi-asserted-by":"crossref","first-page":"2167","DOI":"10.1007\/s10586-017-0992-3","article-title":"Fast prime number generation algorithms on smart mobile devices","volume":"20","author":"Jo","year":"2017","journal-title":"Clust. Comput."},{"key":"ref_105","doi-asserted-by":"crossref","unstructured":"Iswari, N.M.S. (2016, January 5\u20136). Key generation algorithm design combination of RSA and ElGamal algorithm. Proceedings of the 2016 8th International Conference on Information Technology and Electrical Engineering: Empowering Technology for Better Future, ICITEE, Yogyakarta, Indonesia.","DOI":"10.1109\/ICITEED.2016.7863255"},{"key":"ref_106","doi-asserted-by":"crossref","unstructured":"Raghunandan, K.R., Shetty, R., and Aithal, G. (2017, January 6\u20137). Key generation and security analysis of text cryptography using cubic power of Pell\u2019s equation. Proceedings of the 2017 International Conference on Intelligent Computing, Instrumentation and Control Technologies, ICICICT, Kerala, India.","DOI":"10.1109\/ICICICT1.2017.8342791"},{"key":"ref_107","first-page":"11","article-title":"Algorithm for rapid key generation in the RSA cryptographic system","volume":"7","author":"Balabanov","year":"2009","journal-title":"Bull. Sci. Tech. Dev."},{"key":"ref_108","unstructured":"Vasilenko, O.N. (2003). Numerical-Numerical Algorithms in Cryptography, MNCMO."},{"key":"ref_109","unstructured":"Cheremushkin, A.V. (2002). Lectures on Arithmetic Algorithms in Cryptography, MNCMO."},{"key":"ref_110","unstructured":"Ribenboim, P. (2004). The Little Book of Bigger Primes, Springer-Verlag."},{"key":"ref_111","first-page":"247","article-title":"Method for constructing algorithms for verifying the simplicity of natural numbers for the protection of information","volume":"2","author":"Kruchinin","year":"2011","journal-title":"Rep. Tusur"},{"key":"ref_112","first-page":"3","article-title":"A Method for Obtaining Generating Function for Central Coefficients of Triangles","volume":"15","author":"Kruchinin","year":"2012","journal-title":"J. Integer Seq."},{"key":"ref_113","first-page":"97","article-title":"A generator of criteria for the simplicity of the natural number","volume":"4","author":"Shablya","year":"2015","journal-title":"Rep. Tusur"},{"key":"ref_114","unstructured":"Melman, V.S., Shablya, Y.V., and Kruchinin, D.V. (2016, January 16\u201318). Methods of analyzing the simplicity tests of numbers. Proceedings of the XII International Scientific and Practical Conference \u201cElectronic Tools and Control Systems\u201d, Tomsk, Russia."},{"key":"ref_115","first-page":"95","article-title":"Software for the analysis of tests for the simplicity of the natural number","volume":"4","author":"Kruchinin","year":"2014","journal-title":"Rep. Tusur"},{"key":"ref_116","doi-asserted-by":"crossref","unstructured":"Fridrich, J. (2010). Steganography in Digital Media: Principles, Algorithms, and Applications, Cambridge University Press.","DOI":"10.1017\/CBO9781139192903"},{"key":"ref_117","unstructured":"Salomon, D. (2007). Data Compression: The Complete Reference, Springer-Verlag. [4th ed.]."},{"key":"ref_118","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1016\/j.displa.2016.03.002","article-title":"An improved least-significant-bit substitution method using the modulo three strategy","volume":"42","author":"Xu","year":"2016","journal-title":"Displays"},{"key":"ref_119","doi-asserted-by":"crossref","first-page":"15651","DOI":"10.1007\/s11042-014-2355-x","article-title":"Data hiding based on overlapped pixels using hamming code","volume":"75","author":"Kim","year":"2016","journal-title":"Multimed. Tools Appl."},{"key":"ref_120","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1016\/j.csi.2016.10.005","article-title":"Improving stego image quality in image interpolation based data hiding","volume":"50","author":"Yang","year":"2017","journal-title":"Comput. Stand. Interfaces"},{"key":"ref_121","doi-asserted-by":"crossref","first-page":"574","DOI":"10.1109\/LSP.2017.2679043","article-title":"High-Fidelity Reversible Data Hiding Using Directionally Enclosed Prediction","volume":"24","author":"Chen","year":"2017","journal-title":"IEEE Signal Process. Lett."},{"key":"ref_122","doi-asserted-by":"crossref","first-page":"140","DOI":"10.1016\/j.ins.2014.03.030","article-title":"Reversible data hiding using Delaunay triangulation and selective embedment","volume":"308","author":"Hong","year":"2015","journal-title":"Inf. Sci."},{"key":"ref_123","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1016\/j.amc.2007.05.063","article-title":"Color image steganography scheme using DFT, SPIHT codec, and modified differential phase-shift keying techniques","volume":"196","author":"Chen","year":"2008","journal-title":"Appl. Math. Comput."},{"key":"ref_124","doi-asserted-by":"crossref","first-page":"6473","DOI":"10.1007\/s11042-016-3301-x","article-title":"High-capacity steganography: A global-adaptive-region discrete cosine transform approach","volume":"76","author":"Rabie","year":"2017","journal-title":"Multimed. Tools Appl."},{"key":"ref_125","doi-asserted-by":"crossref","first-page":"8627","DOI":"10.1007\/s11042-016-3501-4","article-title":"Toward optimal embedding capacity for transform domain steganography: A quad-tree adaptive-region approach","volume":"76","author":"Rabie","year":"2017","journal-title":"Multimed. Tools Appl."},{"key":"ref_126","doi-asserted-by":"crossref","first-page":"5493","DOI":"10.1007\/s11042-015-2522-8","article-title":"Optimization-based image watermarking with integrated quantization embedding in the wavelet-domain","volume":"75","author":"Chen","year":"2016","journal-title":"Multimed. Tools Appl."},{"key":"ref_127","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1007\/s00500-008-0327-7","article-title":"PM1 steganography in JPEG images using genetic algorithm","volume":"13","author":"Yu","year":"2009","journal-title":"Soft Comput."},{"key":"ref_128","doi-asserted-by":"crossref","first-page":"1869","DOI":"10.1007\/s11042-014-2377-4","article-title":"Low overhead reversible data hiding for color JPEG images","volume":"75","author":"Nikolaidis","year":"2016","journal-title":"Multimed. Tools Appl."},{"key":"ref_129","doi-asserted-by":"crossref","first-page":"1965","DOI":"10.1016\/j.jss.2013.03.083","article-title":"A high capacity lossless data hiding scheme for JPEG images","volume":"86","author":"Wang","year":"2013","journal-title":"J. Syst. Softw."},{"key":"ref_130","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1007\/s11554-015-0555-x","article-title":"Adaptive real-time reversible data hiding for JPEG images","volume":"14","author":"Yang","year":"2018","journal-title":"J. Real-Time Image Process."},{"key":"ref_131","doi-asserted-by":"crossref","unstructured":"Hong, W. (2018). Efficient data hiding based on block truncation coding using pixel pair matching technique. Symmetry, 10.","DOI":"10.3390\/sym10020036"},{"key":"ref_132","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1016\/j.ins.2018.05.055","article-title":"Joint image coding and lossless data hiding in VQ indices using adaptive coding techniques","volume":"463\u2013464","author":"Hong","year":"2018","journal-title":"Inf. Sci."},{"key":"ref_133","first-page":"15","article-title":"Modification of steganographic LSB method based on the usage of modular cellular automata","volume":"1","author":"Evsutin","year":"2014","journal-title":"Inf. Sci. Control Syst."},{"key":"ref_134","doi-asserted-by":"crossref","first-page":"314","DOI":"10.18287\/0134-2452-2014-38-2-314-321","article-title":"Research of the discrete orthogonal transformation received with use the dynamics of cellular automata","volume":"38","author":"Evsutin","year":"2014","journal-title":"Comput. Opt."},{"key":"ref_135","first-page":"108","article-title":"Algorithms for data hiding in digital images using interpolation","volume":"1","author":"Evsutin","year":"2015","journal-title":"Rep. Tusur"},{"key":"ref_136","doi-asserted-by":"crossref","first-page":"28567","DOI":"10.1007\/s11042-018-6055-9","article-title":"The adaptive algorithm of information unmistakable embedding into digital images based on the discrete Fourier transformation","volume":"77","author":"Evsutin","year":"2018","journal-title":"Multimed. Tools Appl."},{"key":"ref_137","doi-asserted-by":"crossref","first-page":"572","DOI":"10.18287\/0134-2452-2015-39-4-572-581","article-title":"An improved algorithm for data hiding in compressed digital images based on PM1 method","volume":"39","author":"Evsutin","year":"2015","journal-title":"Comput. Opt."},{"key":"ref_138","doi-asserted-by":"crossref","first-page":"412","DOI":"10.18287\/2412-6179-2017-41-3-412-421","article-title":"An algorithm for information embedding into compressed digital images based on replacement procedures with use of optimization","volume":"41","author":"Evsutin","year":"2017","journal-title":"Comput. Opt."},{"key":"ref_139","doi-asserted-by":"crossref","first-page":"3567","DOI":"10.1109\/TII.2018.2841049","article-title":"Cryptographic Solutions for Industrial Internet-of-Things: Research Challenges and Opportunities","volume":"14","author":"Choo","year":"2018","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_140","doi-asserted-by":"crossref","first-page":"3590","DOI":"10.1109\/TII.2017.2780885","article-title":"Blend Arithmetic Operations on Tensor-Based Fully Homomorphic Encryption Over Real Numbers","volume":"14","author":"Keke","year":"2018","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_141","doi-asserted-by":"crossref","first-page":"3618","DOI":"10.1109\/TII.2017.2771382","article-title":"Certificateless Public Key Authenticated Encryption with Keyword Search for Industrial Internet of Things","volume":"14","author":"He","year":"2018","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_142","doi-asserted-by":"crossref","first-page":"3712","DOI":"10.1109\/TII.2017.2784395","article-title":"Lightweight Searchable Public-Key Encryption for Cloud-Assisted Wireless Sensor Networks","volume":"14","author":"Xu","year":"2018","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_143","doi-asserted-by":"crossref","first-page":"3648","DOI":"10.1109\/TII.2018.2794442","article-title":"File-Centric Multi-Key Aggregate Keyword Searchable Encryption for Industrial Internet of Things","volume":"14","author":"Zhou","year":"2018","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_144","doi-asserted-by":"crossref","first-page":"3599","DOI":"10.1109\/TII.2017.2773666","article-title":"A Robust ECC-Based Provable Secure Authentication Protocol with Privacy Preserving for Industrial Internet of Things","volume":"14","author":"Li","year":"2018","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_145","doi-asserted-by":"crossref","first-page":"3701","DOI":"10.1109\/TII.2018.2794991","article-title":"Provably Secure and Lightweight Certificateless Signature Scheme for IIoT Environment","volume":"14","author":"Karati","year":"2018","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_146","doi-asserted-by":"crossref","first-page":"3659","DOI":"10.1109\/TII.2018.2810840","article-title":"A Novel Latin-Square-Based Secret Sharing for M2M Communications","volume":"14","author":"Shen","year":"2018","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_147","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1109\/MCOM.2017.1700041","article-title":"DistBlockNet: A Distributed Blockchains-Based Secure SDN Architecture for IoT Networks","volume":"55","author":"Sharma","year":"2017","journal-title":"IEEE Commun. Mag."},{"key":"ref_148","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1109\/MCE.2018.2816745","article-title":"DistArch-SCNet: Blockchain-Based Distributed Architecture with Li-Fi Communication for a Scalable Smart City Network","volume":"7","author":"Sharma","year":"2018","journal-title":"IEEE Consum. Electron. Mag."},{"key":"ref_149","doi-asserted-by":"crossref","unstructured":"Kim, D.-Y., Kim, S., and Park, J.H. (2017). Remote Software Update in Trusted Connection of Long Range IoT Networking Integrated with Mobile Edge Cloud. IEEE Access.","DOI":"10.1109\/ACCESS.2017.2774239"},{"key":"ref_150","unstructured":"Patel, H. (December, January 27). Non-parametric feature generation for RF-fingerprinting on ZigBee devices. Proceedings of the IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA), Verona, NY, USA."},{"key":"ref_151","unstructured":"Bojinov, H., Michalevsky, Y., Nakibly, G., and Boneh, D. (arXiv, 2014). Mobile device identification via sensor fingerprinting, arXiv."},{"key":"ref_152","doi-asserted-by":"crossref","unstructured":"Ferdowsi, A., and Saad, W. (arXiv, 2018). Deep Learning for Signal Authentication and Security in Massive Internet of Things Systems, arXiv.","DOI":"10.1109\/TCOMM.2018.2878025"},{"key":"ref_153","first-page":"111","article-title":"Model of Security Threats to the Automated System for Commercial Accounting of Energy Resources","volume":"19","author":"Novokhrestov","year":"2016","journal-title":"Rep. Tusur"},{"key":"ref_154","first-page":"49","article-title":"Research on Evaluation Method of Hierarchical Network Security Threat","volume":"31","author":"Gong","year":"2016","journal-title":"Revista de la Facultad de Ingenier\u00eda U.C.V."},{"key":"ref_155","first-page":"107","article-title":"Organization of a Protected Heterogeneous Network in Automated Systems for Commercial Accounting of Energy Resources","volume":"19","author":"Antonov","year":"2016","journal-title":"Rep. Tusur"},{"key":"ref_156","doi-asserted-by":"crossref","unstructured":"Usmonov, B., Evsutin, O., Iskhakov, A., Shelupanov, A., Iskhakova, A., and Meshcheryakov, R. (2017, January 2\u20134). The cybersecurity in development of IoT embedded technologies. Proceedings of the 2017 International Conference on Information Science and Communications Technologies (ICISCT), Tashkent, Uzbekistan.","DOI":"10.1109\/ICISCT.2017.8188589"},{"key":"ref_157","doi-asserted-by":"crossref","unstructured":"Iskhakov, S., Shelupanov, A., and Mitsel, A. (2018, January 18\u201325). Internet of Things: Security of Embedded Devices. Proceedings of the 2018 3rd Russian-Pacific Conference on Computer Technology and Applications (RPC), Vladivostok, Russia.","DOI":"10.1109\/RPC.2018.8482148"}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/11\/2\/150\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T12:29:27Z","timestamp":1760185767000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/11\/2\/150"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,29]]},"references-count":157,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2019,2]]}},"alternative-id":["sym11020150"],"URL":"https:\/\/doi.org\/10.3390\/sym11020150","relation":{},"ISSN":["2073-8994"],"issn-type":[{"value":"2073-8994","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,1,29]]}}}