
Many factors are contributing to any increased awareness of and interest in computer security. This article has described two aspects of computer security, identification of users and cryptography as a tool for data security. We looked at a number of ways to verify the identity of a user, including things a person knows, has, or is. Combinations of techniques were considered as a means of increasing security. Next, we looked at some simple examples of cryptosystems, including the rail fence cipher (a transposition technique), and the Caesar cipher (a substitution technique). Two computer systems were described, DES (a product cipher), and RSA (a cipher based on exponentiation and the mod operation).
User-Computer Interface, Hospital Information Systems, Computer Security, United States
User-Computer Interface, Hospital Information Systems, Computer Security, United States
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 0 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
