The Use of Passwords for Controlled Access to Computer Resources. Computer Science & Technology / Helen M. Wood.
This paper considers the generation of passwords and their effective application to the problem of controlling access to computer resources. After describing the need for and uses of passwords, password schemes are categorized according to selection technique, lifetime, physical characteristics, and...
Main Author: | |
---|---|
Corporate Author: | |
Language: | English |
Published: |
[Place of publication not identified] :
Distributed by ERIC Clearinghouse,
1977.
|
Subjects: | |
Genre: | |
Physical Description: | 60 pages |
Format: | Microfilm Book |
System Under Maintenance
Our Library Management System is currently under maintenance.
Holdings and item availability information is currently unavailable. Please accept our apologies for any inconvenience this may cause and contact us for further assistance:
Please contact Reference and Discovery Services via their Contact Form or call them directly at: 517-353-8700 for assistance.