By Topic

Proceedings of the IEEE

Issue 5 • Date May 1988

Filter Results

Displaying Results 1 - 13 of 13
  • Theory and applications of near ballistic transport in semiconductors

    Publication Year: 1988, Page(s):519 - 532
    Cited by:  Papers (39)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1152 KB)

    A review of electronic transport in semiconductors in the near ballistic regime is presented. Recent experiments and theories are discussed in detail. It is shown that the basic physics of ballistic transport is qualitatively well understood. Quantitatively much work remains to be done, especially with respect to device applications. Some problems related to applications are discussed in context w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A microprocessor controlled programmable switching module for phased array applications

    Publication Year: 1988, Page(s):636 - 638
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (136 KB)

    An Intel 8085 microprocessor-based algorithm is presented to provide programmable switching for p-i-n diodes that can be interfaced with an 8225 programmable peripheral interface chip. This can be useful in the realization of phased array in which p-i-n diode switching modules are to be switched ON/OFF according to a certain desired pattern in the time domain View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Magnetic field of cylindrical surface currents

    Publication Year: 1988, Page(s):628 - 632
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (336 KB)

    Infinite surfaces carrying surface currents with translational symmetry in one direction are considered. When the magnetic field is treated as a bivector quantity rather than an axial vector quantity, its simple relation to the plane visual angle of the surface becomes easy to establish by means of the Biot-Savart law. If the surface with the current divides the space into two parts, the magnetic ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data Encryption Standard: past and future

    Publication Year: 1988, Page(s):550 - 559
    Cited by:  Papers (47)  |  Patents (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1004 KB)

    The authors examine the past and future of the Data Encryption Standard (DES), which is the first, and to the present date, only, publicly available cryptographic algorithm that has been endorsed by the US government of the standard during the early 1970s, the controversy regarding the proposed standard during the mid-1970s, the growing acceptance and use of the standard in the 1980s, and some rec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Antenna pulsewidth distortion paradox explained

    Publication Year: 1988, Page(s):635 - 636
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (184 KB)

    A paradox of why there can be no pulsewidth distortion for an antenna array which is receiving or transmitting a wide-bandwidth chirp waveform is presented and explained. When a very narrow pulse is received at an off-boresite angle by an antenna array using phase steering, the pulse becomes distorted, that is, dispersed. The pulsewidth spreading is equal to the difference in the times of arrival ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • How to insure that data acquired to verify treaty compliance are trustworthy

    Publication Year: 1988, Page(s):621 - 627
    Cited by:  Papers (8)  |  Patents (18)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (988 KB)

    The author presents a solution to the problem of how to make it possible for two mutually distrusting (and presumed deceitful) parties, the host and the monitor, to both trust a data acquisition system that informs the monitor and perhaps third parties, whether the host has or has not violated the terms of a treaty. He starts by assuming that such a data acquisition system exists, and that the opp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An introduction to contemporary cryptology

    Publication Year: 1988, Page(s):533 - 549
    Cited by:  Papers (73)  |  Patents (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1580 KB)

    An appraisal is given of the current status, both technical and nontechnical, of cryptologic research. The principal concepts of both secret-key and public-key cryptography are described. C.E. Shanon's theory of secrecy (1949) and G.J. Simon's theory authenticity (1984) are reviewed for the insight that they give into practical cryptographic systems. Public-key concepts are illustrated through con... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multiplication-free adaptive digital filters

    Publication Year: 1988, Page(s):632 - 634
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (208 KB)

    The authors update delta modulation digital filter weights using the LMS (least-mean-squares) and the SIGN algorithms to realize an adaptive digital filter without multiplication operations. It is shown that using the SIGN algorithm results in an adaptive filter that can be implemented using the simple up/down counting operations. Learning curves demonstrating convergence properties of the algorit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The first ten years of public-key cryptography

    Publication Year: 1988, Page(s):560 - 577
    Cited by:  Papers (56)  |  Patents (112)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1976 KB)

    The development of public-key cryptography is described, and its principles are elucidated. The discussion covers exponential key exchange, the trap-door knapsack public-key cryptosystem, the Rivest-Shamir-Adleman (RSA) system, and the breaking of the knapsack cryptosystem. Early responses to public-key systems and the problem of key management are examined. Applications and implementations are de... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Another algorithm for converting a low-pass function into bandpass form

    Publication Year: 1988, Page(s):634 - 635
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (176 KB)

    An algorithm based on evaluating a recurrence relation using a synthetic polynomial multiplication is presented for use in converting low-pass transfer functions into bandpass form. It is felt that this procedure is more easily programmed than are recently published algorithms. A function implementing the algorithm has been programmed in C View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cryptanalysis: a survey of recent results

    Publication Year: 1988, Page(s):578 - 593
    Cited by:  Papers (30)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1472 KB)

    Cryptosystems are tested by subjecting them to cryptanalytic attacks by experts. Most of the cryptosystems that have been publicly proposed in the last decade have been broken. Some of the attacks that have been used are outlined, and some of the basic tools available to the cryptanalyst are explained. Attacks on the knapsack cryptosystems, congruential generators, and a variety of two key secrecy... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Protocol failures in cryptosystems

    Publication Year: 1988, Page(s):594 - 602
    Cited by:  Papers (41)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (812 KB)

    When a cryptoalgorithm is used to solve data security or authentication problems, it is implemented within the context of a protocol that specifies the appropriate procedures for data handling. The purpose of the protocol is to ensure that when the cryptosystem is applied, the level of security or authentication required by the system is actually attained. The author surveys a collection of protoc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A survey of information authentication

    Publication Year: 1988, Page(s):603 - 620
    Cited by:  Papers (26)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1812 KB)

    The general principles that underlie all authentication schemes are reviewed and illustrated using the examples of an early telegraphy cable code, a US military authentication protocol, and authentication of electronic funds transfers in the US Federal Reserve System. Authentication threats from inside the system (i.e. untrustworthy sender or receiver) are described. The classification of authenti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

The most highly-cited general interest journal in electrical engineering and computer science, the Proceedings is the best way to stay informed on an exemplary range of topics.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
H. Joel Trussell
North Carolina State University