First page Back Continue Last page Overview Graphics
Characteristics of these approaches
All cover infinite subspaces
All enhance predictability for users and unpredictability for attackers (people)
All based on existing ideas that have stood the test of time
All can be done with a 'scientific' approach
All alter the standard assumptions we use
None have been thoroughly explored yet
Notes: