RT Journal Article ID 7d7a442d145944b7 A1 Tipikin, A. P. A1 Tanygin, M. O. T1 Methods of Authentication of Information Protection Systems and Controlling Software JF Telecommunications and Radio Engineering JO TRE YR 2007 FD 2007-07-12 VO 66 IS 5 SP 453 OP 463 AB The problem of the impact of destructive programs on hardware information protection systems is analyzed. Methods for monitoring the legality of commands of the software controlling protection hardware are proposed. PB Begell House LK https://www.dl.begellhouse.com/journals/0632a9d54950b268,3fbc9bd70d4c8494,7d7a442d145944b7.html