Möglichkeiten des Einsatzes einer Chipkarte zur Realisierung von Sicherungsfunktionen an Büroarbeitsplätzen
暂无分享,去创建一个
[1] A. Beutelspacher. Zugangskontrolle zu Rechnern Mit Hilfe Einer Chipkarte , 1987 .
[2] Martin E. Hellman,et al. An improved algorithm for computing logarithms over GF(p) and its cryptographic significance (Corresp.) , 1978, IEEE Trans. Inf. Theory.
[3] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[4] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[5] Charles Cresson Wood,et al. Security for computer networks : D.W. Davies and W.L. Price New York: John Wiley and Sons, 1984. 386 + xix pages, $19.50 , 1985, Computers & security.