A hard-core predicate for all one-way functions
STOC '89 Proceedings of the twenty-first annual ACM symposium on Theory of computing
Secret-key agreement without public-key
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
vic: a flexible framework for packet video
Proceedings of the third ACM international conference on Multimedia
Provably secure session key distribution: the three party case
STOC '95 Proceedings of the twenty-seventh annual ACM symposium on Theory of computing
Password security: a case history
Communications of the ACM
Using encryption for authentication in large networks of computers
Communications of the ACM
Cryptography: Theory and Practice
Cryptography: Theory and Practice
Flexible control of downloaded executable content
Flexible control of downloaded executable content
Evaluation of gatekeeper proxies for firewall traversal in secure videoconferencing systems
International Journal of Internet Protocol Technology
Hi-index | 0.00 |
At the Center for Information Technology Integration, we are experimenting with algorithms and protocols for building secure applications. In our security testbed, we have modified VIC, an off-the-shelf videoconferencing application, to support GSS, a generic security interface. We then layered these interfaces onto a smartcard-based key distribution algorithm and a fast cipher. Because these components are accompanied by rigorous mathematical proofs of security and are accessed through narrowly-defined interfaces, we have confidence in the strength of the system's security.