A user authentication scheme not requiring secrecy in the computer
In many computer operating systems a user authenticates himself by entering a secret password known solely to himself and the system. The system compares this password…
A user authentication scheme not requiring secrecy in the computer
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get Involved