Skip to main content
padlock icon - secure page this page is secure

Publisher: Emerald Group Publishing Limited

Volume 10, Number 3, 2002

An experimental comparison of secret-based user authentication technologies
pp. 100-108(9)
Authors: Irakleous, I.; Furnell, S.M.; Dowland, P.S.; Papadaki, M.

Favourites:
ADD

Information management of automatic data capture: an overview of technical developments
pp. 109-118(10)
Authors: Smith, Alan D.; Offodile, Felix

Favourites:
ADD

The information security management toolbox – taking the pain out of security management
pp. 119-125(7)
Authors: Vermeulen, Clive; Von Solms, Rossouw

Favourites:
ADD
Favourites:
ADD

System insecurity – firewalls
pp. 135-139(5)
Authors: Desai, Mayur S.; Richards, Thomas C.; von der Embse, Thomas

Favourites:
ADD

  • Access Key
  • Free content
  • Partial Free content
  • New content
  • Open access content
  • Partial Open access content
  • Subscribed content
  • Partial Subscribed content
  • Free trial content
Cookie Policy
X
Cookie Policy
Ingenta Connect website makes use of cookies so as to keep track of data that you have filled in. I am Happy with this Find out more