REFERENCES

M. BOND AND P. ZELINSKI, “Decimilisation Table Attacks for PIN Cracking”, University of Cambridge, Computer Laboratory, Report 560, February 2003.

DPA, DPA, www.cryptography.com.

ISO/IEC 7816, “ISO 7816 Smart Card Standard”, Part 1, 1998.

G. PURDY, “A High Security Log-In Procedure”, Communications of the ACM, 17, 442–445 (1984).

RFC, “Internet X.509 Public Key Infrastructure: Certficiate and CRL Prfoile.”

PH. VAN HEURCK, “TRASEC: National Security System for EFTSA in Belgium”, Computer Networks and ISDN Systems, 14, 389–395 (1987).

PH. VAN HEURCK, “Security and Protection in Information Systems”, A. GRISSONMANCHE (ed.), Elsevier Science, 243–251 (1989).

ITU, CCITT, Recommendation X.509, “The Directory – Authentication Framework”, Consultation Committee, International Telephone and Telegraph, International Telecommunication Union, Geneva, 1989.

American National Standards Institute, “The ANSI Standard X9.1-1980: Bank Cards – Magnetic Stripe Content for Track 3,” 1980).

S. W. GOLOMB, Shift Register Sequences, Agean Park Press (Laguna Hills, California), 1982.

R. A. RUEPPEL, Analysis and Design of Stream Ciphers, Springer-verlag, (New York, NY), 1986.

1The file /etc/passwd can be read by any user and certainly presents an exposure. The shadow implementation lessens this threat.

2According to Bankrate.com's latest survey (2005) of large banks and thrifts, ATM fees have hit a record high and, despite rising interest rates, interest checking accounts still do not add up. ...

Get Computer Security and Cryptography now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.