{"title":"A distributed optical fiber alarm system of very high dynamic range","authors":"G. Kotrotsios, O. Parnaux","doi":"10.1109/CCST.1989.751972","DOIUrl":"https://doi.org/10.1109/CCST.1989.751972","url":null,"abstract":"A fiber optic alarm system is presented. It uses conventional communication fibers in their dual mode regime. The location of a detected event is made by measuring the difference between the transit time of the modes from an activated transducer to the fiber end. A fiber optic alarm system is presented. It uses conventional communication fibers in their dual mode regime. The location of a detected event is made by measuring the difference between the transit time of the modes from an activated transducer to the fiber end.","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117335558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Good stream ciphers are hard to design","authors":"R. A. Rueppel","doi":"10.1109/CCST.1989.751974","DOIUrl":"https://doi.org/10.1109/CCST.1989.751974","url":null,"abstract":"Cipher systems are commonly subdivided into block ciphers and stream ciphers. In the application, block ciphers require, as their name indicates, large blocksizes. Contrastingly, stream ciphers can operate on data units as small as a bit or a character, a fact that has greatly contributed to their popularity. In this paper a survey of the different approaches to the design of stream cipher systems is presented. Examples are used to illustrate the results that can be obtained.","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122603399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security in the telephone network of the 90's","authors":"J. Brewster, H. Kluepfel, T.C. Peak","doi":"10.1109/CCST.1989.751958","DOIUrl":"https://doi.org/10.1109/CCST.1989.751958","url":null,"abstract":"In the 90s three major network architectures will emerge and eventually combine into a single public network Infrastructure. These are the Integrated Digital Services Network (ISDN), the Intelligent Network (IN) and the Broadband Integrated Digital Services Network (BISDN). Developments of thebe architectures have to some extent been promulgated independently of each other mainly due to different perceived needs being addressed. As these architectures are deployed in the telephone network, a single ubiquitous, Intelligent, integrated, broadband infrastructure will evolve. The major needs producing this rapid evolution of the public network in the United States include (but are not limited to): 1. The need to provide new digital services in a cost effective manner, 2. The need to provide services in a timely fashion. 3. The need to provide high bandwidth services for the transmission of video and data. 4. The need to provide the customer more control over his or her services. 5. The need to interact and interface with more diverse public and private networks. 6. The need to meet regulations requiring the \"opening up\" of the public network to other service vendors. 7. The need to become part of the global community and to support International standards. B. The need to provide capabilities/functions within the network to meet customer needs. As each of these needs pushes the evolution of the public network, the network's security requirements and exposures are also changing. This paper will look at those changes and approaches to address them","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132270007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A flexible protocol communications approach for a supervisory system","authors":"R. Valle-Alarcon, J. Serrat-Fernández","doi":"10.1109/CCST.1989.751991","DOIUrl":"https://doi.org/10.1109/CCST.1989.751991","url":null,"abstract":"This paper deals with the communication protocol intended to control up to 1016 devices of a new supervisory system. It has been conceived in two complementary phases. The first one (Cycle-A) is intended to inform the Central Station of any event detected by the installed devices in less than two seconds. The second one allows to set up a link between the Central Station and a selected Local Station in order to request more information or to action its devices for command or programming purposes. The dialog between the Central Station and the Local Station takes place on a two wire communication channel, also used to supply de current from the Central to all Local Stations.","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"11 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126094981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new approach to perimeter protection","authors":"R. Genaehr, H. Smit","doi":"10.1109/CCST.1989.751986","DOIUrl":"https://doi.org/10.1109/CCST.1989.751986","url":null,"abstract":"The problem of perimeter protection systems is still a high false alarm rate if a high probability of detection is required. This paper discusses a new seismic perimeter protection system which promises better performance by having more parameters available for intelligent signal processing. This results not only in a much better detection probability to false alarm ratio, but also in less restrictive requirements for installation and maintenance of such a system.","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121896298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
B. Prencel, A. Bosselaers, R. Govaerts, J. Vandewalle
{"title":"Collision-free hashfunctions based on blockcipher algorithms","authors":"B. Prencel, A. Bosselaers, R. Govaerts, J. Vandewalle","doi":"10.1109/CCST.1989.751980","DOIUrl":"https://doi.org/10.1109/CCST.1989.751980","url":null,"abstract":"The concept of collision free hash functions has been shown to be a useful building block of signature schemes and message authentication schemes. In this paper, a fast and secure proposal is made for a 2n-bit collison free hash function based on an n-bit encryp tion algorithm. In case of the DES, the length of the result is 128 bits, which suffices to thwart a birthday attack.","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115591297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proceedings 1989 International Carnahan Conference On Security Technology","authors":"","doi":"10.1109/CCST.1989.751943","DOIUrl":"https://doi.org/10.1109/CCST.1989.751943","url":null,"abstract":"","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133094175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}