Безопасность информационных технологий (Sep 2013)
Affiliations
Read online
The article is devoted to the actual problem, especially for multi-user secure information systems, of safe key information storing. The creation of a key storage, devoid of weaknesses of existing storages, is proposed and substantiated.