Proceedings. International Carnahan Conference on Security Technology最新文献

筛选
英文 中文
A distributed optical fiber alarm system of very high dynamic range 一种高动态范围分布式光纤报警系统
Proceedings. International Carnahan Conference on Security Technology Pub Date : 1989-10-03 DOI: 10.1109/CCST.1989.751972
G. Kotrotsios, O. Parnaux
{"title":"A distributed optical fiber alarm system of very high dynamic range","authors":"G. Kotrotsios, O. Parnaux","doi":"10.1109/CCST.1989.751972","DOIUrl":"https://doi.org/10.1109/CCST.1989.751972","url":null,"abstract":"A fiber optic alarm system is presented. It uses conventional communication fibers in their dual mode regime. The location of a detected event is made by measuring the difference between the transit time of the modes from an activated transducer to the fiber end. A fiber optic alarm system is presented. It uses conventional communication fibers in their dual mode regime. The location of a detected event is made by measuring the difference between the transit time of the modes from an activated transducer to the fiber end.","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117335558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Good stream ciphers are hard to design 好的流密码很难设计
Proceedings. International Carnahan Conference on Security Technology Pub Date : 1989-10-03 DOI: 10.1109/CCST.1989.751974
R. A. Rueppel
{"title":"Good stream ciphers are hard to design","authors":"R. A. Rueppel","doi":"10.1109/CCST.1989.751974","DOIUrl":"https://doi.org/10.1109/CCST.1989.751974","url":null,"abstract":"Cipher systems are commonly subdivided into block ciphers and stream ciphers. In the application, block ciphers require, as their name indicates, large blocksizes. Contrastingly, stream ciphers can operate on data units as small as a bit or a character, a fact that has greatly contributed to their popularity. In this paper a survey of the different approaches to the design of stream cipher systems is presented. Examples are used to illustrate the results that can be obtained.","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122603399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Security in the telephone network of the 90's 九十年代电话网络的安全问题
Proceedings. International Carnahan Conference on Security Technology Pub Date : 1989-10-03 DOI: 10.1109/CCST.1989.751958
J. Brewster, H. Kluepfel, T.C. Peak
{"title":"Security in the telephone network of the 90's","authors":"J. Brewster, H. Kluepfel, T.C. Peak","doi":"10.1109/CCST.1989.751958","DOIUrl":"https://doi.org/10.1109/CCST.1989.751958","url":null,"abstract":"In the 90s three major network architectures will emerge and eventually combine into a single public network Infrastructure. These are the Integrated Digital Services Network (ISDN), the Intelligent Network (IN) and the Broadband Integrated Digital Services Network (BISDN). Developments of thebe architectures have to some extent been promulgated independently of each other mainly due to different perceived needs being addressed. As these architectures are deployed in the telephone network, a single ubiquitous, Intelligent, integrated, broadband infrastructure will evolve. The major needs producing this rapid evolution of the public network in the United States include (but are not limited to): 1. The need to provide new digital services in a cost effective manner, 2. The need to provide services in a timely fashion. 3. The need to provide high bandwidth services for the transmission of video and data. 4. The need to provide the customer more control over his or her services. 5. The need to interact and interface with more diverse public and private networks. 6. The need to meet regulations requiring the \"opening up\" of the public network to other service vendors. 7. The need to become part of the global community and to support International standards. B. The need to provide capabilities/functions within the network to meet customer needs. As each of these needs pushes the evolution of the public network, the network's security requirements and exposures are also changing. This paper will look at those changes and approaches to address them","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132270007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A flexible protocol communications approach for a supervisory system 一种用于监控系统的灵活协议通信方法
Proceedings. International Carnahan Conference on Security Technology Pub Date : 1989-10-03 DOI: 10.1109/CCST.1989.751991
R. Valle-Alarcon, J. Serrat-Fernández
{"title":"A flexible protocol communications approach for a supervisory system","authors":"R. Valle-Alarcon, J. Serrat-Fernández","doi":"10.1109/CCST.1989.751991","DOIUrl":"https://doi.org/10.1109/CCST.1989.751991","url":null,"abstract":"This paper deals with the communication protocol intended to control up to 1016 devices of a new supervisory system. It has been conceived in two complementary phases. The first one (Cycle-A) is intended to inform the Central Station of any event detected by the installed devices in less than two seconds. The second one allows to set up a link between the Central Station and a selected Local Station in order to request more information or to action its devices for command or programming purposes. The dialog between the Central Station and the Local Station takes place on a two wire communication channel, also used to supply de current from the Central to all Local Stations.","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"11 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126094981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new approach to perimeter protection 周边防护的新方法
Proceedings. International Carnahan Conference on Security Technology Pub Date : 1989-10-03 DOI: 10.1109/CCST.1989.751986
R. Genaehr, H. Smit
{"title":"A new approach to perimeter protection","authors":"R. Genaehr, H. Smit","doi":"10.1109/CCST.1989.751986","DOIUrl":"https://doi.org/10.1109/CCST.1989.751986","url":null,"abstract":"The problem of perimeter protection systems is still a high false alarm rate if a high probability of detection is required. This paper discusses a new seismic perimeter protection system which promises better performance by having more parameters available for intelligent signal processing. This results not only in a much better detection probability to false alarm ratio, but also in less restrictive requirements for installation and maintenance of such a system.","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121896298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Collision-free hashfunctions based on blockcipher algorithms 基于块密码算法的无冲突哈希函数
Proceedings. International Carnahan Conference on Security Technology Pub Date : 1900-01-01 DOI: 10.1109/CCST.1989.751980
B. Prencel, A. Bosselaers, R. Govaerts, J. Vandewalle
{"title":"Collision-free hashfunctions based on blockcipher algorithms","authors":"B. Prencel, A. Bosselaers, R. Govaerts, J. Vandewalle","doi":"10.1109/CCST.1989.751980","DOIUrl":"https://doi.org/10.1109/CCST.1989.751980","url":null,"abstract":"The concept of collision free hash functions has been shown to be a useful building block of signature schemes and message authentication schemes. In this paper, a fast and secure proposal is made for a 2n-bit collison free hash function based on an n-bit encryp tion algorithm. In case of the DES, the length of the result is 128 bits, which suffices to thwart a birthday attack.","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115591297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Proceedings 1989 International Carnahan Conference On Security Technology 1989年国际安全技术研讨会论文集
Proceedings. International Carnahan Conference on Security Technology Pub Date : 1900-01-01 DOI: 10.1109/CCST.1989.751943
{"title":"Proceedings 1989 International Carnahan Conference On Security Technology","authors":"","doi":"10.1109/CCST.1989.751943","DOIUrl":"https://doi.org/10.1109/CCST.1989.751943","url":null,"abstract":"","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133094175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信