Computer security.

1Citations
Citations of this article
268Readers
Mendeley users who have this article in their library.

Abstract

Many factors are contributing to any increased awareness of and interest in computer security. This article has described two aspects of computer security, identification of users and cryptography as a tool for data security. We looked at a number of ways to verify the identity of a user, including things a person knows, has, or is. Combinations of techniques were considered as a means of increasing security. Next, we looked at some simple examples of cryptosystems, including the rail fence cipher (a transposition technique), and the Caesar cipher (a substitution technique). Two computer systems were described, DES (a product cipher), and RSA (a cipher based on exponentiation and the mod operation).

Cite

CITATION STYLE

APA

Wear, L. L., & Pinkert, J. R. (1993). Computer security. Journal of AHIMA / American Health Information Management Association, 64(9), 30–32, 34, 36. https://doi.org/10.32398/cjhp.v3i3.643

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free