skip navigation


Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.


NCJ Number: 98918 Find in a Library
Title: International Conference on Security Communications Systems, 22-23 February 1984
Corporate Author: Institution of Electrical Engineers
United Kingdom
Date Published: 1984
Page Count: 84
Sponsoring Agency: Institution of Electrical Engineers
London, WC2R OBL, England
Format: Document
Language: English
Country: United Kingdom
Annotation: These papers from the 1984 International Conference on Secure Communication Systems cover the management and distribution of keys for electronic fund transfer (EFT) point-of-sale (POS) systems, data security for particular telecommunications systems, security equipment and systems, and controlling access to direct broadcasting.
Abstract: A paper on the management and distribution of keys for EFT POS systems focuses on the use of a data-bearing card that precludes the need for secret data accessible through computer terminals as well as the use of digital signatures and negotiable documents in POS systems. Another paper explains how to simplify key management in EFT POS systems. Papers on data security describe the security system for the British Telecom SATSTREAM service and the Project UNIVERSE encryption experiment, which is designed to provide security for data transmissions. Three papers examine speech digitization techniques, compare the cryptographic requirements for digital secure speech systems operating at different bit rates, and review potential electromagnetic compatibility problems in the design of secure communication systems. Additional papers discuss a survey of encryption algorithms, multilevel knapsack encryption, practical primality testing and a practical fast exponentiation algorithm for a public key. Three papers deal with systems for controlling access to direct broadcasting systems limited to paying customers. Diagrams of the security systems and references are included.
Index Term(s): Computer privacy and security; Data security; Electronic funds transfer; Encryption; Great Britain/United Kingdom; Personnel identification systems; Security systems; Telecommunications; Transmission security
Note: Conference Publication number 231.
To cite this abstract, use the following link:

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.