Identifying computer users with authentication devices (tokens)

J.-C. Spender. Identifying computer users with authentication devices (tokens). Computers & Security, 6(5):385-395, 1987. [doi]

@article{Spender87,
  title = {Identifying computer users with authentication devices (tokens)},
  author = {J.-C. Spender},
  year = {1987},
  doi = {10.1016/0167-4048(87)90011-3},
  url = {http://dx.doi.org/10.1016/0167-4048(87)90011-3},
  researchr = {https://researchr.org/publication/Spender87},
  cites = {0},
  citedby = {0},
  journal = {Computers & Security},
  volume = {6},
  number = {5},
  pages = {385-395},
}