Attacks on Human Identification Schemes

碩士 === 國立成功大學 === 資訊及電子工程研究所 === 83 === The security of a system often depends on identifying correctly the person at a terminal. There are many authentication mechanisms which support the security problem for computer systems...

Full description

Bibliographic Details
Main Authors: Peng ,Maujy, 彭懋芝
Other Authors: Tzonelih Hwang
Format: Others
Language:zh-TW
Published: 1995
Online Access:http://ndltd.ncl.edu.tw/handle/54659590209837200105