USER AUTHENTICATION SCHEME NOT REQUIRING SECRECY IN COMPUTER

被引:91
作者
EVANS, A
KANTROWITZ, W
WEISS, E
机构
[1] MIT, LINCOLN LAB, LEXINGTON, MA 02173 USA
[2] BOSTON UNIV, BOSTON, MA USA
关键词
D O I
10.1145/361082.361087
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
引用
收藏
页码:437 / 442
页数:6
相关论文
共 8 条
[1]   CRYPTOGRAPHY AND COMPUTER PRIVACY [J].
FEISTEL, H .
SCIENTIFIC AMERICAN, 1973, 228 (05) :15-23
[2]  
FEISTEL H, 1970, RC2827 IBM TJ WATS R
[3]  
KAHN D, 1967, CODE BREAKERS
[4]  
Knuth D. E., 1969, ART COMPUTER PROGRAM, V2
[5]  
PURDY G, 1973, SECURITY CODE
[6]   COMMUNICATION THEORY OF SECRECY SYSTEMS [J].
SHANNON, CE .
BELL SYSTEM TECHNICAL JOURNAL, 1949, 28 (04) :656-715
[7]  
SMITH JL, 1972, P ACM C, P282
[8]  
WILKES MV, 1972, TIME SHARING COMPUTE