Skip to main content

Part of the book series: Practitioner Series ((PRACT.SER.))

Abstract

Around 2000 BC the Egyptians developed what was perhaps the first key operated lock mechanism. This device consisted of a solid beam, carved from hardwood and hollowed from the end to create a slot. When locked, this beam was prevented from moving by the means of pegs in a staple, that were attached to the hollowed beam. Unlocking the lock required a key, typically a foot in length or more. This ancient design evolved into its modern day equivalent known as the tumbler lock, still using fundamentally the same technology. The only major difference is simply the size.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Notes

  1. Computerworld, 7 February 1994.

    Google Scholar 

  2. E. Spafford. “The Internet Worm: Crisis and Aftermath”, Communications of the ACM, Volume 32 Number 6, June 1989,pp. 678–688.

    Article  Google Scholar 

  3. R. Morris and K. Thompson, “Password Security: A Case History”, Communications of the ACM, Volume 22 Number 11,1979.

    Google Scholar 

  4. A. Warman, Computer Security Within Organisations, 1993.

    Google Scholar 

  5. S. Wu, “MHS Security — A concise survey”, Computer Networks & ISDN Systems, Volume 25,1992, pp. 490–495.

    Article  Google Scholar 

  6. W. Diffie and M.E. Hellman, “New Directions in Cryptography”, IEEE Transactions on Information Theory, Volume IT-22,1976,pp. 644–654.

    Article  MathSciNet  Google Scholar 

  7. Wall Street Journal, 28 April 1994.

    Google Scholar 

  8. M. Elkins, “MIME Security With Pretty Good Privacy (PGP)”, RFC 2015, September 1996.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 1998 Springer-Verlag London Limited

About this chapter

Cite this chapter

Chesher, M., Kaura, R. (1998). Security. In: Electronic Commerce and Business Communications. Practitioner Series. Springer, London. https://doi.org/10.1007/978-1-4471-3018-5_13

Download citation

  • DOI: https://doi.org/10.1007/978-1-4471-3018-5_13

  • Publisher Name: Springer, London

  • Print ISBN: 978-3-540-19930-4

  • Online ISBN: 978-1-4471-3018-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics