1-1 of 1
Keywords: authentication protocol
Follow your search
Access your saved searches in your account

Would you like to receive an alert when new items match your search?
Close Modal
Sort by
Journal Articles
Feminist Media Histories (2017) 3 (3): 57–81.
Published: 01 July 2017
... expectations about users’ lives and relationships. This is nowhere more evident than in the canonical security question, “What is your mother's maiden name?” To trace the evolution of the security question, this article surveys industry writings on authentication protocols from the 1850s to the present...