Studying Authentication of Electronic Society
碩士 === 國立臺灣師範大學 === 工業教育研究所 === 86 === Traditional methods of user authenticatior systems suffer from an important weakness which degree of randomness in secrets that human being can identification. Even though weak secrets (passwords and Personal Identification Number, PIN) are typically not expos...
Main Author: | 莊慶郎 |
---|---|
Other Authors: | 樊國楨 |
Format: | Others |
Language: | zh-TW |
Published: |
1998
|
Online Access: | http://ndltd.ncl.edu.tw/handle/84261389219453371175 |
Similar Items
-
An Empirical study of the Authentic Leadership on job Engagement : The Mediating Effect of the Gratitude
by: CHEN, CHENG-LANG, et al.
Published: (2017) -
Authentication and Encryption for Electronic Business
by: Kao, Min-Chih, et al.
Published: (2009) -
A MAN IS IN INFORMATIVE SOCIETY: PROBLEM OF MORAL AUTHENTICATION
by: Олег Геннадійович Данильян, et al.
Published: (2019-02-01) -
Authentic electronic business notebooks to prove electronic banking
by: Taima Mahmoud Fawzi, et al.
Published: (2013-06-01) -
Mutual authentication in electronic commerce transactions.
by: Kisimov, Martin Valentinov
Published: (2008)