Login / Signup

A High Security Log-in Procedure.

George B. Purdy
Published in: Commun. ACM (1974)
Keyphrases
  • high security
  • image encryption
  • security analysis
  • low cost
  • computer simulation
  • information security
  • data sharing