Login / Signup
A High Security Log-in Procedure.
George B. Purdy
Published in:
Commun. ACM (1974)
Keyphrases
</>
high security
image encryption
security analysis
low cost
computer simulation
information security
data sharing