Novel security techniques for online systems
By ensuring entry to subsystems (zones) with different facilities and security levels, log-in procedures can do more than simply delay illicit access.
Novel security techniques for online systems
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get Involved