Excerpt from Chapter 6 of
Authentication: From Passwords to Public Keys
Copyright © 2002 Addison-Wesley.
This paper was also published as an article in CSI's Computer Security Journal, Summer 2002 (see Note 14).
Copyright 2014 Cryptosmith LLC
Theme by Danetsoft and Danang Probo Sayekti inspired by Maksimer