Abstract
Around 2000 BC the Egyptians developed what was perhaps the first key operated lock mechanism. This device consisted of a solid beam, carved from hardwood and hollowed from the end to create a slot. When locked, this beam was prevented from moving by the means of pegs in a staple, that were attached to the hollowed beam. Unlocking the lock required a key, typically a foot in length or more. This ancient design evolved into its modern day equivalent known as the tumbler lock, still using fundamentally the same technology. The only major difference is simply the size.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Notes
Computerworld, 7 February 1994.
E. Spafford. “The Internet Worm: Crisis and Aftermath”, Communications of the ACM, Volume 32 Number 6, June 1989,pp. 678–688.
R. Morris and K. Thompson, “Password Security: A Case History”, Communications of the ACM, Volume 22 Number 11,1979.
A. Warman, Computer Security Within Organisations, 1993.
S. Wu, “MHS Security — A concise survey”, Computer Networks & ISDN Systems, Volume 25,1992, pp. 490–495.
W. Diffie and M.E. Hellman, “New Directions in Cryptography”, IEEE Transactions on Information Theory, Volume IT-22,1976,pp. 644–654.
Wall Street Journal, 28 April 1994.
M. Elkins, “MIME Security With Pretty Good Privacy (PGP)”, RFC 2015, September 1996.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 1998 Springer-Verlag London Limited
About this chapter
Cite this chapter
Chesher, M., Kaura, R. (1998). Security. In: Electronic Commerce and Business Communications. Practitioner Series. Springer, London. https://doi.org/10.1007/978-1-4471-3018-5_13
Download citation
DOI: https://doi.org/10.1007/978-1-4471-3018-5_13
Publisher Name: Springer, London
Print ISBN: 978-3-540-19930-4
Online ISBN: 978-1-4471-3018-5
eBook Packages: Springer Book Archive