1 - 4 of 4 articles
Most large business organizations have functions called" computer security" or "data security". Very often, these activities are organizationally located within the information systems department or data center.
Electronic Funds Transfer Systems (EFTS) are facing a crisis that must soon be overcome. In order to achieve the maximum cost benefits of EFTS, it is necessary that automated banking transactions be accepted on a widespread basis. General acceptance has not yet occured because of problems with...
A logical authentication test requires no special hardware. As a proof of identity, the accessor is required to know or to use secret information. In a generalized model of logical authentication, the user learns an encryption algorithm whose functional description is secret. This model includes...
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Sign Up Log In
To subscribe to email alerts, please log in first, or sign up for a DeepDyve account if you don’t already have one.
To get new article updates from a journal on your personalized homepage, please log in first, or sign up for a DeepDyve account if you don’t already have one.