共 26 条
[1]
Davies, Price, Security for Computer Networks — An Introduction to Data Security in Teleprocessing and Electronic Funds Transfer, (1989)
[2]
Denning, Cryptography and Data Security, (1982)
[3]
Pfleeger, Security in Computing, (1989)
[4]
Seberry, Pieprzyk, Cryptography — An Introduction to Computer Security, (1989)
[5]
Menkus, Understanding the use of passwords, Computers & Security, 7, pp. 132-136, (1988)
[6]
Purdy, A high security log-in procedure, Comm. ACM, 17, 8, pp. 442-445, (1974)
[7]
Data Encryption Standard, Federal Information Processing Standard (FIPs), Publication 45, (1977)
[8]
Evans, Kantrowitz, Weiss, A user authentication scheme not requiring secrecy in the computer, Comm. ACM, 17, 8, pp. 437-442, (1974)
[9]
Feistel, Notz, Smith, Some cryptographic techniques for machine to machine data communications, Proc. IEEE, 63, pp. 1545-1554, (1975)
[10]
Lennon, Matyas, Meyer, Cryptographic authentication of time-invariant quantities, IEEE Trans. Comm., 29, 6, pp. 773-777, (1981)

