Security without identification: transaction systems to make big brother obsolete
Communications of the ACM
Pass-algorithms: a user validation scheme based on knowledge of secret algorithms
Communications of the ACM
Hi-index | 48.22 |
By ensuring entry to subsystems (zones) with different facilities and security levels, log-in procedures can do more than simply delay illicit access.