HIGH SECURITY LOG-IN PROCEDURE

被引:65
作者
PURDY, GB [1 ]
机构
[1] UNIV ILLINOIS, CTR ADV COMP, URBANA, IL 61801 USA
关键词
D O I
10.1145/361082.361089
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
引用
收藏
页码:442 / 445
页数:4
相关论文
共 7 条
[1]   FACTORING POLYNOMIALS OVER LARGE FINITE FIELDS [J].
BERLEKAMP, ER .
MATHEMATICS OF COMPUTATION, 1970, 24 (111) :713-+
[2]  
Hardy G. H., 2008, An introduction to the theory of numbers, V6th
[3]  
Knuth D.E., 1969, The Art of Computer Programming, VII, DOI 10.2307/2283757
[4]  
PURDY GB, TO BE PUBLISHED
[5]   COMMUNICATION THEORY OF SECRECY SYSTEMS [J].
SHANNON, CE .
BELL SYSTEM TECHNICAL JOURNAL, 1949, 28 (04) :656-715
[6]  
Wilkes Maurice., 1968, Time-sharing Computer systems
[7]  
ZIMMER HG, 1972, COMPUTATIONAL PROBLE, V262, pCH2