IEEE Communications Society Magazine

Issue 6 • November 1978

Filter Results

Displaying Results 1 - 22 of 22
  • [Front cover and table of contents]

    Publication Year: 1978, Page(s): 0
    Request permission for reuse | PDF file iconPDF (808 KB)
    Freely Available from IEEE
  • Call for papers

    Publication Year: 1978, Page(s): 1
    Request permission for reuse | PDF file iconPDF (615 KB)
    Freely Available from IEEE
  • Editorial - Communications privacy

    Publication Year: 1978, Page(s): 2
    Request permission for reuse | PDF file iconPDF (97 KB)
    Freely Available from IEEE
  • ComSoc spotlight

    Publication Year: 1978, Page(s):3 - 4
    Request permission for reuse | PDF file iconPDF (225 KB)
    Freely Available from IEEE
  • Society and chapter news

    Publication Year: 1978, Page(s): 4
    Request permission for reuse | PDF file iconPDF (87 KB)
    Freely Available from IEEE
  • The data encryption standard in perspective

    Publication Year: 1978, Page(s):5 - 9
    Cited by:  Papers (16)  |  Patents (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (520 KB)

    The Data Encryption Standard (DES) was approved as a Federal Information Processing Standard (FIPS) by the Secretary of Commerce on November 23, 1976. This Standard was developed as a part of the Computer Security Program within the Institute for Computer Sciences and Technology at the National Bureau of Standards (NBS). This paper places this standard in perspective with other computer security m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The data encryption standard--Retrospective and prospects

    Publication Year: 1978, Page(s):11 - 14
    Cited by:  Papers (8)
    Request permission for reuse | PDF file iconPDF (315 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and specification of cryptographic capabilities

    Publication Year: 1978, Page(s):15 - 19
    Cited by:  Papers (11)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (390 KB)

    Cryptography can be used to provide data secrecy, data authentication, and originator authentication. Non-reversible transformation techniques provide only the last. Cryptographic check digits Provide both data and originator authentication, but no secrecy. Data secrecy, with or without data authentication, is provided by block encryption or data stream encryption techniques. Total systems securit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Special announcement

    Publication Year: 1978, Page(s): 19
    Request permission for reuse | PDF file iconPDF (80 KB)
    Freely Available from IEEE
  • The use of public key cryptography in communication system design

    Publication Year: 1978, Page(s):20 - 23
    Cited by:  Papers (9)  |  Patents (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (380 KB)

    Since the time of Caesar, cryptography has been used in the design of secure communications systems. Recently, Diffie and Hellman [2] have introduced a new type of cryptographic method, based on "trapdoor" functions, which promises to be of great value in the design of such systems. We present a review of public key cryptosystems, followed by examples of communications systems which make particula... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An overview of public key cryptography

    Publication Year: 1978, Page(s):24 - 32
    Cited by:  Papers (21)  |  Patents (2)
    Request permission for reuse | PDF file iconPDF (826 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security of computer communication

    Publication Year: 1978, Page(s):33 - 40
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for reuse | PDF file iconPDF (765 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An approach to secure voice communication based on the data encryption standard

    Publication Year: 1978, Page(s):41 - 50
    Cited by:  Papers (6)
    Request permission for reuse | PDF file iconPDF (841 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Unclassified summary: Involvement of NSA in the development of the data encryption standard

    Publication Year: 1978, Page(s):53 - 55
    Cited by:  Papers (3)
    Request permission for reuse | PDF file iconPDF (251 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Gentle diversions

    Publication Year: 1978, Page(s):56 - 58
    Request permission for reuse | PDF file iconPDF (321 KB)
    Freely Available from IEEE
  • Meeting reports

    Publication Year: 1978, Page(s):59 - 62
    Request permission for reuse | PDF file iconPDF (426 KB)
    Freely Available from IEEE
  • Conferences

    Publication Year: 1978, Page(s):63 - 64
    Request permission for reuse | PDF file iconPDF (156 KB)
    Freely Available from IEEE
  • Book reviews - Communication systems principles

    Publication Year: 1978, Page(s):65 - 66
    Request permission for reuse | PDF file iconPDF (211 KB)
    Freely Available from IEEE
  • Conference calendar

    Publication Year: 1978, Page(s):66 - 68
    Request permission for reuse | PDF file iconPDF (398 KB)
    Freely Available from IEEE
  • U.S.Abstracts

    Publication Year: 1978, Page(s): 69
    Request permission for reuse | PDF file iconPDF (127 KB)
    Freely Available from IEEE
  • International abstracts

    Publication Year: 1978, Page(s):70 - 71
    Request permission for reuse | PDF file iconPDF (201 KB)
    Freely Available from IEEE
  • [Back cover]

    Publication Year: 1978, Page(s): c4
    Request permission for reuse | PDF file iconPDF (436 KB)
    Freely Available from IEEE

Aims & Scope

This Periodical ceased publication in 1978. The current retitled publication is 

IEEE Communications Magazine.

Full Aims & Scope