dc.contributor.author | Smuts, WB | |
dc.date.accessioned | 2018-06-18T11:20:37Z | |
dc.date.available | 2018-06-18T11:20:37Z | |
dc.date.issued | 1994 | |
dc.identifier.citation | Smuts WB (1994) A survey of information authentication techniques. South African Computer Journal, Number 11, 1994 | en |
dc.identifier.issn | 2313-7835 | |
dc.identifier.uri | http://hdl.handle.net/10500/24404 | |
dc.description.abstract | This article provides a survey of techniques which can be used to add authenticity to electronic documents and messages. | en |
dc.language.iso | en | en |
dc.publisher | South African Computer Society (SAICSIT) | en |
dc.subject | Authentication | en |
dc.subject | Information security | en |
dc.subject | Digital signatures | en |
dc.title | A survey of information authentication techniques | en |
dc.type | Article | en |