Ellis, Leslie
May 2005
Multichannel News;5/9/2005, Vol. 26 Issue 19, p30
Discusses a technical paper by Jim Fahrny on downloadable security to be featured in the 2005 National Show of the National Cable & Telecommunications in the U.S. Impact of the ban of the U.S. Federal Communications Commission regarding embedded security on downloadable security; Effect of downloadable security on the video on demand technology; Importance of digital signatures to the technology.


Related Articles

  • Guard your embedded secrets. Webb, Warren // EDN Europe;Jul2001, Vol. 46 Issue 7, p44 

    Discusses several desktop security-related problems affecting embedded computer systems (ECS). Limited processing and memory resources that make ECS more vulnerable to concentrated attacks; Proliferation of embedded operating systems and architectures; Lack of gateway computers that can isolate...

  • THREAT OF THE MONTH. Carey, Marcus // SC Magazine: For IT Security Professionals (15476693);Mar2012, Vol. 23 Issue 3, p13 

    The article presents questions and answers regarding compromised embedded systems as security threat of the month for March 2012, including what it is, how it works, and how to prevent it.

  • Blueprint for professionalism in IT security. Goodwin, Bill // Computer Weekly;1/18/2005, p12 

    The article reports that for most employers, hiring information technology (IT) security staff is a difficult challenge. The security profession has grown up in an ad hoc way over the past 20 years and there are no widely recognized definitions of what IT security should cover, let alone any...

  • ENHANCING THE SECURITY OF THE RSA CRYPTOSYSTEM. Kakish, Malek Jakob // International Journal of Research & Reviews in Applied Sciences;2011, Vol. 8 Issue 2, p239 

    The RSA public key and signature scheme is often used in modern communications technologies; it is one of the firstly defined public key cryptosystem that enable secure communicating over public unsecure communication channels. This paper introduce a security enhancement on the RSA cryptosystem,...

  • Security Enhancement of Forward Digital Signatures Using ECC. Rajasekhar, M.; Krishna, I. M. V.; John, M. Samuel // International Journal on Computer Science & Engineering;2010, Vol. 2 Issue 6, p2160 

    In this paper we propose a technique to enhance the security of forward digital signature.In this enhancement scheme the private key and the public key changes at random intervals of time ,if there is a communication between two users. If there is no communication then the keys will not be...

  • Supporting Symmetric 128-bit AES in Networked Embedded Systems: An Elliptic Curve Key Establishment Protocol-on-Chip. Duraisamy, Roshan; Salcic, Zoran; Strangio, Maurizio Adriano; Morales-Sandoval, Miguel // EURASIP Journal on Embedded Systems;2007 Regular Issue, p1 

    The secure establishment of cryptographic keys for symmetric encryption via key agreement protocols enables nodes in a network of embedded systems and remote agents to communicate securely in an insecure environment. In this paper, we propose a pure hardware implementation of a key agreement...

  • RSA encryption for embedded systems counters design cloning.  // EDN Europe;Sep2014, Issue 8, p10 

    The article offers brief information on the emSecure, a digital signature software package for embedded systems from Segger.

  • The Effect of Watermark Embedding on Signature Generation in Image Association Technique of Copyright Protection System. Suleiman Al Rababaa, Mamoun // International Journal of Computer Applications;Apr2014, Vol. 91, p1 

    The current research enhances the performance of an already proposed image protection system presented earlier. The former system relies on an association technique instead of embedding owner signature inside an image like traditional watermarking methods. Thus, it retains secured image...

  • A Novel Active Image Authentication Scheme for Block Truncation Coding. Chang-Ming Wu; Yu-Chen Hu; Kuo-Yu Liu; Jun-Chou Chuang // International Journal of Signal Processing, Image Processing & P;2014, Vol. 7 Issue 5, p13 

    In this paper, a simple active image authentication scheme for the compressed images of block truncation coding (BTC) is proposed. In this scheme, the authentication codes of the compressed blocks are generated from the random value induced by the random seed. The authentication code of each...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics