Ian Witten ABACUS, Vol. 4, No. 4, Summer 1987, pp. 7-25. 1987
Despite advances in authentication and encryption methods, computer systems are just as vulnerable as ever.
[Read the article]