Password Authentification with Insecure Communication.
Documentation for a Model: A Hierarchical Approach.
The Evolution of User Behavior in a Computerized Conferencing System.
Problems in Application Software Maintenance.
Authentication of Signature Using Public Key Encryption.
An Experimental Study of the Human/Computer Interface.
Microcomputers as Remote Nodes of a Distributed System.