Crossroads The ACM Magazine for Students

Sign In

Association for Computing Machinery

Confidentially using authentication

Confidentially using authentication

By ,

Full text also available in the ACM Digital Library as PDF | HTML | Digital Edition

Tags: Authentication, Design, Operating systems security, Performance, Security, Theory, Verification

Thank you for your interest in this article. This content is protected. You may log in with your ACM account or subscribe to access the full text.