Passwords in use in a university timesharing environment
暂无分享,去创建一个
[1] Leslie Lamport,et al. Password authentication with insecure communication , 1981, CACM.
[2] Ben F. Barton,et al. User-friendly password methods for computer-mediated information systems , 1984, Comput. Secur..
[3] Charles Cresson Wood. Effective information system security with password controls , 1983, Comput. Secur..
[4] Eugene H. Spafford,et al. The internet worm program: an analysis , 1989, CCRV.
[5] Lance J. Hoffman,et al. Modern methods for computer security and privacy , 1973 .
[6] D. Kahn. The codebreakers : the story of secret writing , 1968 .
[7] J. C. H. Aalders,et al. Handbook for Information Security: A Guide Towards Information Security Standards , 1986 .
[8] Donn B. Parker,et al. Fighting computer crime , 1983 .
[9] Helen Marie Wood,et al. The use of passwords for controlled access to computer resources. , 1977 .