Bluetooth Cavity? SIG Says 'No'
- Waging crypto wars 2.0. Antonopoulos, Andreas // Network World;10/11/2010, Vol. 27 Issue 19, p19
The article shares the author opinion on the disadvantages of backdoor-free encryption into the security systems in the U.S.
- It's been a tough summer for data security. Dipert, Brian // EDN;10/11/2001, Vol. 46 Issue 23, p26
Focuses on the management of data security in the United States. Considerations on the successful encryption of four audio-water-marking proposals at the Secure Digital; Defeat against the wired-equivalent-privacy security algorithm; Details on the encryption on electronic-book-security scheme...
- Enabling secure applications with a public key infrastructure. Arden, Michelle; Palmer, Bradley // Security: Solutions for Enterprise Security Leaders;May99, Vol. 36 Issue 5, p81
Reports the role of public key infrastructure on computer security. Private key technology as an approach to security; Possibility to securely connect business enterprises via the Internet; Efficient data encryption and digital signatures using standards-based public key infrastructure (PKI);...
- MY TRIP TO BELL LABS. Donaton, Scott // Advertising Age;11/1/1993, Vol. 64 Issue 46, p26
Focuses on the author's trip to AT&T Bell Laboratories Inc. in Murray Hill, New Jersey to witness the company's demonstration of a state-of-the-art interactive television system. Description of the laboratory; Security measures at the laboratory; Options offered by the system's prototype menu.
- A Novel Approach Share Key Refreshing for Long Term Protection in Distributed Cryptography by Proactive Security. Retoliya, Rajkumari; Tripathi, Anshu // International Journal of Computer Science Engineering & Technolo;Jul2011, Vol. 1 Issue 6, p290
Security is an important issue for networks, especially for those security-sensitive applications. In the entire environment of security, it is necessary to ensure privacy. This Paper provides share key refreshing technique for maintaining the security of the system, even when some nodes are in...
- Key recovery moves ahead. Moeller, Michael // PC Week;12/23/96, Vol. 13 Issue 51, p36
Reports on the decision by over 20 companies to join the Security Alliance initiative to develop a computer encryption program for documents and messages sent over computers. The Alliance's Key Recovery plan; A list of some of the companies that have joined; What companies are looking for.
- ON THE CRYPTOGRAPHIC MEASURES AND CHAOTIC DYNAMICAL COMPLEXITY MEASURES. Hanping Hu; LingFeng Liu // International Journal on Cryptography & Information Security;Dec2012, Vol. 2 Issue 4, p21
The relationship between cryptographic measures and chaotic dynamical complexity measures is studied in this paper, including linear complexity and measure entropy, nonlinear complexity and source entropy. Moreover, a method is presented to guarantee the complexity of chaos-based pseudorandom...
- Data Hardly Ever Dies: Encrypt Your Warriors' Laptops. Smith, Warren // Security: Solutions for Enterprise Security Leaders;Feb2007, Vol. 44 Issue 2, p74
The article provides information on the need to encrypt laptop data in the U.S. In a recent survey conducted it revealed that business traveler face a risk when their laptops are stolen and many companies are sued in court for privacy breaches by consumers whose personal data are exposed to the...
- Is It Secure Enough? Yes, For Now. Albright, Peggy // Wireless Week;12/11/2000, Vol. 6 Issue 49, p33
Reports updates in the security industry in the United States as of December 2000. Details on a research made by Bell Laboratories of Lucent on security vulnerabilities of a technology on wireless communication systems; Features of the technology.