Plugging the holes in host-based authentication

Jim Reid. Plugging the holes in host-based authentication. Computers & Security, 15(8):661-671, 1996. [doi]

Abstract

Abstract is missing.