USER AUTHENTICATION SCHEME NOT REQUIRING SECRECY IN COMPUTER

被引:90
作者
EVANS, A
KANTROWITZ, W
WEISS, E
机构
[1] MIT, LINCOLN LAB, LEXINGTON, MA 02173 USA
[2] BOSTON UNIV, BOSTON, MA USA
关键词
D O I
10.1145/361082.361087
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
引用
收藏
页码:437 / 442
页数:6
相关论文
共 8 条
  • [1] CRYPTOGRAPHY AND COMPUTER PRIVACY
    FEISTEL, H
    [J]. SCIENTIFIC AMERICAN, 1973, 228 (05) : 15 - 23
  • [2] FEISTEL H, 1970, RC2827 IBM TJ WATS R
  • [3] KAHN D, 1967, CODE BREAKERS
  • [4] Knuth D. E., 1969, ART COMPUTER PROGRAM, V2
  • [5] PURDY G, 1973, SECURITY CODE
  • [6] COMMUNICATION THEORY OF SECRECY SYSTEMS
    SHANNON, CE
    [J]. BELL SYSTEM TECHNICAL JOURNAL, 1949, 28 (04): : 656 - 715
  • [7] SMITH JL, 1972, P ACM C, P282
  • [8] WILKES MV, 1972, TIME SHARING COMPUTE