Author:
Zviran Moshe,Haga William J.
Subject
Law,General Computer Science
Reference10 articles.
1. Verifying the authentication of an information system user;Ahituv;Comput. Secur.,1987
2. How to find out a password;Avarne;Data Process. Commun. Secur.,1988
3. User friendly password methods for computer-mediated information systems;Barton;Comput. Secur.,1984
4. A dozen gross ‘Mythconceptions’ about information processing security;Kurzban,1983
5. Understanding the use of passwords;Menkus;Comput. Secur.,1988
Cited by
31 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献