equal
deleted
inserted
replaced
77 assurance we obtain from the mechanism (the amount of reliance we can |
77 assurance we obtain from the mechanism (the amount of reliance we can |
78 put on the mechanism) and finally the incentives (the motive that the |
78 put on the mechanism) and finally the incentives (the motive that the |
79 people guarding and maintaining the system have to do their job |
79 people guarding and maintaining the system have to do their job |
80 properly, and also the motive that the attackers have to try to defeat |
80 properly, and also the motive that the attackers have to try to defeat |
81 your policy). The last point is often overlooked, but plays an |
81 your policy). The last point is often overlooked, but plays an |
82 important role. Lets look at an example. The questions is whether |
82 important role. |
83 the Chip-and-PIN system with credit cards is more secure than the older |
83 |
84 method of signing receipts at the till. |
84 Lets look at an example. The questions is whether the Chip-and-PIN |
|
85 system with credit cards is more secure than the older method of |
|
86 signing receipts at the till. |
85 |
87 |
86 |
88 |
87 |
89 |
88 \end{document} |
90 \end{document} |
89 |
91 |