What people are saying - Write a review
We haven't found any reviews in the usual places.
Combatting fraudulent attacks on Richard Johnstone
Access control distributed systems
A secure distributed machine as a Roy Jones
1 other sections not shown
access control account number algorithm Annual Loss Expectancy applications architecture area networks attack audit authentication authorised banking bits Card Issuer chip cipher computer security computer system cost countermeasures covert channels cryptographic Data Encryption Standard decoupling key decryption device digital signatures domain EFTPOS electronic encipherment end-systems ensure environment example exponentiation facilities hackers hardware homebanking host identified implementation installation integrity interface units key management key register keystream layer linear complexity MAC residue method microcircuit card modular modular exponentiation multi-level multi-level security multiplication node ONE-WAY FUNCTION operating system organisation paper password personal computer physical potential problem procedures processing processor protection public key risk analysis secure protocol set security compartment security measures security policy security system sensitive sequence server standard stream cipher SYSTEM SECURlTY techniques terminal threats TNIU Token Transaction Key trusted unauthorised workstation