Login / Signup
Password Security - A Case History.
Robert H. Morris Sr.
Ken Thompson
Published in:
Commun. ACM (1979)
Keyphrases
</>
information security
user authentication
security requirements
network security
security policies
security issues
data security
authentication systems
data sets
neural network
intrusion detection
computer security
data integrity
security problems
security threats
authentication mechanism