15.08.2012 Views

CONTENTS - Emerald

CONTENTS - Emerald

CONTENTS - Emerald

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

041168 `The Colossus of Bletchley Park'<br />

AJ Sale, IEE Review, March 1995 pp 55{59<br />

The author describes a project to reconstruct the Colossus, an early computer<br />

used at Bletchley Park for correlation attacks on the Lorentz Geheimschreiber. This<br />

used hundreds of thyratrons to simulate the rotor wheels and counters to keep track of<br />

pattern matches. This machine would process intercepts at 5000 characters per second<br />

| the speed at which the paper tape could be fed | and could break a key setting<br />

in 2-3 days. Although its secrecy meant that it had no direct impact on subsequent<br />

computing history, it had an indirect e ect in that it showed Turing and others that<br />

digital machines with thousands of valves could be made to work reliably.<br />

041169 `Coding for Distributed Computation'<br />

LJ Schulman, Info Theory 94 p 28<br />

The author discusses the impact e ect of noisy links in a computer network when<br />

it comes to performing a distributed computation. This paper may be consider when<br />

looking at the hook up problem in secure networks.<br />

041170 `MultiSix: How it Improves Interoperability in a Multi-Vendor<br />

Network'<br />

S Scudamore, ACM SIGSAC v 13 no 1 (Jan 95) pp 12{16<br />

This paper describes DEC's trusted network architecture which supports DNSIX,<br />

CMW, trusted X, Trusted TCP/IP and Trusted NFS.<br />

041171 `Netscape opens Internet to cards'<br />

S Smith, Cards International (11/1/95) p6<br />

Netscape's new secure browser, together with its commerce server, can now process<br />

credit card transactions through six acquiring banks.<br />

041172 `Internet: Zielscheibe fur Hacker'<br />

D Sticharz, Datenschutzberater v 19 no 2 (15/2/95) pp p{4<br />

The author describes some recent security incidents on the Internet, including an<br />

assault on the San Diego Supercomputer Center in December which used IP address<br />

spoo ng. Attacks on routers are also described and references are given to a number<br />

of CERT advisories.<br />

041173 `Bolero trade steps'<br />

STalmor, The Banker (Feb 95) pp 72{75<br />

The EC's Bolero project, to develop and pilot an EDI system for bills of lading,<br />

is due to nish in July. As these bills carry value as well as information, they are<br />

digitally signed, with secret keys managed using smartcards; there is also a central<br />

registry, whose main purpose is to stop banks obtaining all the trading information of<br />

payees. Perceived bene ts to traders include cutting errors and processing costs, while<br />

banks are concerned to integrate bills of lading with letter of credit systems.<br />

041174 `Faster, ever faster'<br />

ITredinnick, International Security Review no 87 (Winter 94/5) pp 17{18<br />

ISDN lines may nd an important application in video surveillance; they increase<br />

the frame rate from 1 per 3 seconds to 4{6 per second.<br />

041175 `A signature scheme using a compiler'<br />

K Usuda, M Mambo,TUyematsu, E Okamoto, JW-ISC 95 pp 111{119<br />

The authors describe a signature scheme for virus protection: it reassures the<br />

programmer that his executable programs are signed without being infected with a<br />

virus.<br />

11

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!