CONTENTS - Emerald
CONTENTS - Emerald
CONTENTS - Emerald
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
041168 `The Colossus of Bletchley Park'<br />
AJ Sale, IEE Review, March 1995 pp 55{59<br />
The author describes a project to reconstruct the Colossus, an early computer<br />
used at Bletchley Park for correlation attacks on the Lorentz Geheimschreiber. This<br />
used hundreds of thyratrons to simulate the rotor wheels and counters to keep track of<br />
pattern matches. This machine would process intercepts at 5000 characters per second<br />
| the speed at which the paper tape could be fed | and could break a key setting<br />
in 2-3 days. Although its secrecy meant that it had no direct impact on subsequent<br />
computing history, it had an indirect e ect in that it showed Turing and others that<br />
digital machines with thousands of valves could be made to work reliably.<br />
041169 `Coding for Distributed Computation'<br />
LJ Schulman, Info Theory 94 p 28<br />
The author discusses the impact e ect of noisy links in a computer network when<br />
it comes to performing a distributed computation. This paper may be consider when<br />
looking at the hook up problem in secure networks.<br />
041170 `MultiSix: How it Improves Interoperability in a Multi-Vendor<br />
Network'<br />
S Scudamore, ACM SIGSAC v 13 no 1 (Jan 95) pp 12{16<br />
This paper describes DEC's trusted network architecture which supports DNSIX,<br />
CMW, trusted X, Trusted TCP/IP and Trusted NFS.<br />
041171 `Netscape opens Internet to cards'<br />
S Smith, Cards International (11/1/95) p6<br />
Netscape's new secure browser, together with its commerce server, can now process<br />
credit card transactions through six acquiring banks.<br />
041172 `Internet: Zielscheibe fur Hacker'<br />
D Sticharz, Datenschutzberater v 19 no 2 (15/2/95) pp p{4<br />
The author describes some recent security incidents on the Internet, including an<br />
assault on the San Diego Supercomputer Center in December which used IP address<br />
spoo ng. Attacks on routers are also described and references are given to a number<br />
of CERT advisories.<br />
041173 `Bolero trade steps'<br />
STalmor, The Banker (Feb 95) pp 72{75<br />
The EC's Bolero project, to develop and pilot an EDI system for bills of lading,<br />
is due to nish in July. As these bills carry value as well as information, they are<br />
digitally signed, with secret keys managed using smartcards; there is also a central<br />
registry, whose main purpose is to stop banks obtaining all the trading information of<br />
payees. Perceived bene ts to traders include cutting errors and processing costs, while<br />
banks are concerned to integrate bills of lading with letter of credit systems.<br />
041174 `Faster, ever faster'<br />
ITredinnick, International Security Review no 87 (Winter 94/5) pp 17{18<br />
ISDN lines may nd an important application in video surveillance; they increase<br />
the frame rate from 1 per 3 seconds to 4{6 per second.<br />
041175 `A signature scheme using a compiler'<br />
K Usuda, M Mambo,TUyematsu, E Okamoto, JW-ISC 95 pp 111{119<br />
The authors describe a signature scheme for virus protection: it reassures the<br />
programmer that his executable programs are signed without being infected with a<br />
virus.<br />
11