Novel security techniques for online systems
暂无分享,去创建一个
By ensuring entry to subsystems (zones) with different facilities and security levels, log-in procedures can do more than simply delay illicit access.
[1] David Chaum,et al. Security without identification: transaction systems to make big brother obsolete , 1985, CACM.
[2] James A. Haskett,et al. Pass-algorithms: a user validation scheme based on knowledge of secret algorithms , 1984, CACM.