Abstracts - faqs.org

Abstracts

Electronics

Search abstracts:
Abstracts » Electronics

How to insure that data acquired to verify treaty compliance are trustworthy

Article Abstract:

An authentication methodology has been devised to assure the validity of messages or data in a data acquisition system for the verification of a nuclear test ban treaty. The strategy to prevent deceptive, erroneous, or manipulated data involves the concatenation of two or more authentication channels. No data need be kept secret from any party involved, and no less than collusion by all parties involved could keep any data secret or generate forged data. The specific properties of the system include: no messages can be forged that would be accepted as authentic by others, no part of a message is concealable, all parties can independently verify any messages, no action by any party can lessen confidence in the system by others, and the hardware supplier can gain no benefit.

Author: Simmons, Gustavus J.
Publisher: Institute of Electrical and Electronics Engineers, Inc.
Publication Name: Proceedings of the IEEE
Subject: Electronics
ISSN: 0018-9219
Year: 1988
Product introduction, Nuclear arms control, Activism, Political protest, Arms control verification, Soviet Union, Political Issue, New Technique, Methods

User Contributions:

Comment about this article or add new information about this topic:

CAPTCHA


The Data Encryption Standard: past and future

Article Abstract:

The US National Bureau of Standards (NBS) public Data Encryption Standard (DES) is the most widely known and used single-key cryptographic algorithm, and the only one endorsed by the US government. The DES algorithm includes a set of functions that transforms one 64-bit input into a 64-bit output, with over 70 quadrillion possible transformations enabled by a 56-bit key. The algorithm is used for data encryption, data authentication, or both for such applications as data storage, electronic mail, electronic funds transfer, and electronic business data interchange. The US National Security Agency (NSA) initiated a Commercial COMSEC Endorsement Program to provide new non-public cryptographic algorithms that would be specifically designed and controlled by the NSA.

Author: Smid, Miles E., Branstad, Dennis K.
Publisher: Institute of Electrical and Electronics Engineers, Inc.
Publication Name: Proceedings of the IEEE
Subject: Electronics
ISSN: 0018-9219
Year: 1988
Regulation misc. commercial sectors, Research, Standard, Standardization, Encryption, Data encryption, Government Agency, Algorithm Analysis, United States. National Bureau of Standards

User Contributions:

Comment about this article or add new information about this topic:

CAPTCHA


Supervisory control and data acquisition

Article Abstract:

All modern utility control systems are based on the fundamental building blocks of data acquisition, data processing for the operator, and operator control of remote devices. Supervisory Control and Data Acquisition Systems (SCADA) accomplish these functions. An overview of the functions and fundamentals SCADA is provided including a description of the key man-machine interface. Problems and issues discussed include: system obsolescence, message standards and system performance testing. Current trends such as improved man-machine interface, standard systems, distributed processing, and standard software are pointed out. The use of interchangeable parts is seen as a future direction.

Author: Gaushell, Dennis, Darlington, Henry T.
Publisher: Institute of Electrical and Electronics Engineers, Inc.
Publication Name: Proceedings of the IEEE
Subject: Electronics
ISSN: 0018-9219
Year: 1987
Supervision, Data Acquisition Systems

User Contributions:

Comment about this article or add new information about this topic:

CAPTCHA


Subjects list: Data security, National Government, Military, Validation, technical
Similar abstracts:
  • Abstracts: Calibration case study of natural source electromagnetic array data recorded over a well in Oregon. Lateral Electromagnetic Waves Along Plane Boundaries: A Summarizing Approach
  • Abstracts: Synchronous data flow. Performance of coherent optical receivers. The synchronous data flow programming language LUSTRE
  • Abstracts: On coupling multi-systems through data sharing. Computation of single-tone spurious effects in radio communication systems
  • Abstracts: Spaceborne radar measurement of wind velocity over the ocean - an overview of the NSCAT Scatterometer system. Overview of MM and UTD methods at the Ohio State University
  • Abstracts: Man-machine interface problems in designing air traffic control systems. Transient mean and variance of overflow traffic in a loss system
This website is not affiliated with document authors or copyright owners. This page is provided for informational purposes only. Unintentional errors are possible.
Some parts © 2025 Advameg, Inc.