2020
DOI: 10.20998/2522-9052.2020.3.02
|View full text |Cite
|
Sign up to set email alerts
|

A Method for User Authenticating to Critical Infrastructure Objects Based on Voice Message Identification

Abstract: Ab s t r a c t. The subject of the research is the protection of critical infrastructure objects from unauthorized access based on voice message identification. The purpose of the research is to consider the main methods and algorithms for identifying an individual by voice, as well as the development of a software implementation of the restricted zone access control system, which allows improving the security of the standard password system by introducing voice authorization technologies and improving the alg… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 4 publications
0
3
0
Order By: Relevance
“…The table shows the title of article, layer(s) of authentication applied, authors and, subject of the study. Of the 28 articles reviewed, 20 were about biometric authentication [18 -21], [23 -33], [35], [37], [40], [42], [44]. There were 17 studies about textual password authentication [17], [21], [23], [25 -27], [30], [32 -38], [41 -43] and three studies about graphical password authentication [22], [34], [39].…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…The table shows the title of article, layer(s) of authentication applied, authors and, subject of the study. Of the 28 articles reviewed, 20 were about biometric authentication [18 -21], [23 -33], [35], [37], [40], [42], [44]. There were 17 studies about textual password authentication [17], [21], [23], [25 -27], [30], [32 -38], [41 -43] and three studies about graphical password authentication [22], [34], [39].…”
Section: Resultsmentioning
confidence: 99%
“…There were some studies excluded from this review [48 -52] as they did not focus on types of authentication methods as a safety practice for information security. Of the 28 articles reviewed, 13 were based in India [20 -26], [30], [34 -37], [42]; four were from China [32], [33], [38], [44]; two from Saudi Arabia [18], [19] one from Poland [27]; one from the Czech Republic [31]; one from the United Arab Emirates [28]; one from Turkey [43]; one from Ukraine [40]; 1 from Jordan [17]; and one each from Zambia [29]; Philippines [39]; and the United States [41] (as shown in Figure 2).…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation