Fast "infinite-key" privacy transformation for resource-sharing systems
AFIPS '70 (Fall) Proceedings of the November 17-19, 1970, fall joint computer conference
The formulary model for flexible privacy and access controls
AFIPS '71 (Fall) Proceedings of the November 16-18, 1971, fall joint computer conference
Privacy transformations for databank systems
AFIPS '73 Proceedings of the June 4-8, 1973, national computer conference and exposition
Computer network cryptography engineering
AFIPS '76 Proceedings of the June 7-10, 1976, national computer conference and exposition
The application of cryptography for data base security
AFIPS '76 Proceedings of the June 7-10, 1976, national computer conference and exposition
Cryptography using modular software elements
AFIPS '76 Proceedings of the June 7-10, 1976, national computer conference and exposition
The authorization problem in shared files
IBM Systems Journal
Hi-index | 0.00 |
Two digital cryptographic techniques are described which may have potential applications in Data Processing Systems. A method of digital substitution analogous to a Vernan double tape system is presented, using a controlled combination of data and the contents of two memories. The second method uses a digital route transposition matrix using a combination of row and column transposition under memory control. Possible ways of achieving key leverage in each ciphering process are described.