The designer of secure computer systems needs to ensure that onlynauthorised users use the system. The alternative automatic or computernaided techniques must therefore be considered. This is especially thencase in distributed computing systems. The author considers: passwords,nPINs and biometrics. From the latter he considers: signature;nfingerprint; voice pattern; retinal patterns; hand shape and typingnrhythm
展开▼