How to construct pseudorandom permutations from pseudorandom functions
SIAM Journal on Computing - Special issue on cryptography
BEAST: a fast block cipher for arbitrary blocksizes
Proceedings of the IFIP TC6/TC11 international conference on Communications and multimedia security II
Password authentication with insecure communication
Communications of the ACM
IDMS '96 Proceedings of the European Workshop on Interactive Distributed Multimedia Systems and Services
A Model for Collaborative Services in Distributed Learning Environments
IDMS '97 Proceedings of the 4th International Workshop on Interactive Distributed Multimedia Systems and Telecommunication Services
Interactive Remote Recording and Playback of Multicast Videoconferences
IDMS '97 Proceedings of the 4th International Workshop on Interactive Distributed Multimedia Systems and Telecommunication Services
A protocol improvement for High-bandwidth encryption using non-encrypting Smart Cards
Proceedings of the IFIP TC11 WG11.1/WG11.2 Seventh Annual Working Conference on Information Security Management & Small Systems Security
Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish)
Fast Software Encryption, Cambridge Security Workshop
High-Bandwidth Encryption with Low-Bandwidth Smartcards
Proceedings of the Third International Workshop on Fast Software Encryption
Proceedings of the Third International Workshop on Fast Software Encryption
Two Practical and Provably Secure Block Ciphers: BEARS and LION
Proceedings of the Third International Workshop on Fast Software Encryption
FSE '98 Proceedings of the 5th International Workshop on Fast Software Encryption
Accelerated Remotely Keyed Encruption
FSE '99 Proceedings of the 6th International Workshop on Fast Software Encryption
Remotely keyed encryption using non-encrypting smart cards
WOST'99 Proceedings of the USENIX Workshop on Smartcard Technology on USENIX Workshop on Smartcard Technology
Markov ciphers and differential cryptanalysis
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
How to Make a Digital Whiteboard Secure - Using Java-Cards for Multimedia Applications
IDMS '00 Proceedings of the 7th International Workshop on Interactive Distributed Multimedia Systems and Telecommunication Services
Hi-index | 0.24 |
This paper presents the design and the security concept of the digital lecture board, an enhanced whiteboard tailored to the specific needs of collaborative types of work, for instance, in computer-based distance education. The development of the digital lecture board emerged from our experiences with synchronous, computer-based distance education in the TeleTeaching projects of the University of Mannheim. For almost four years, we have been using video conferencing tools for transmitting lectures and seminars. These tools prove to be far from optimal for this purpose since they are not powerful enough to support team work, not flexible enough for the use of media, and somewhat difficult to handle for non-experts. Security issues such as authentication, secure key exchange, and fast symmetric encryption are almost completely neglected, even though security is extremely important to allow for confidential, private sessions, and billing. We discuss shortcomings of existing video conferencing tools and describe features we had in mind while designing the digital lecture board. We then present our security concept that is a user-oriented approach that takes into account the specific security requirements of different user groups. We also cover implementation issues of the current prototype.