Zobrazeno 1 - 4
of 4
pro vyhledávání: '"Richard Edward Lennon"'
Publikováno v:
IEEE Transactions on Communications. 29:773-777
With any strong cryptographic algorithm, such as the data encryption standard (DES), it is possible to devise protocols for authentication. One technique, which allows arbitrary, time-invariant quantities (such as encrypted keys and passwords) to be
Publikováno v:
Data Processing. 26:36-38
Recent reports of breaches in computer system security have created a heightened concern and interest in the vulnerability of computer systems. Cryptography is one method of combatting one problem of security. The article describes the two types of a
Publikováno v:
IEEE Symposium on Security and Privacy
A set of required security criteria is developed which assures that the personal verification processes at different institutions in an interchange environment are isolated from one another. It is assumed that only information stored on the bank card
Publikováno v:
IEEE Transactions on Communications. 29:1409-1409