Verifying the authentication of an information system user
- 30 April 1987
- journal article
- Published by Elsevier in Computers & Security
- Vol. 6 (2) , 152-157
- https://doi.org/10.1016/0167-4048(87)90086-1
Abstract
No abstract availableKeywords
This publication has 5 references indexed in Scilit:
- Effective information system security with password controlsComputers & Security, 1983
- Integrity and security standards based on cryptographyComputers & Security, 1982
- Breaching system securityIEEE Spectrum, 1982
- Design and specification of cryptographic capabilitiesIEEE Communications Society Magazine, 1978
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978