Provably Secure Videoconferencing
dc.contributor.author | Honeyman, Peter | en_US |
dc.contributor.author | Adamson, Andy | en_US |
dc.contributor.author | Coffman, Kevin | en_US |
dc.contributor.author | Janakiraman, Janani | en_US |
dc.contributor.author | Jerdonek, Rob | en_US |
dc.contributor.author | Rees, Jim | en_US |
dc.date.accessioned | 2014-07-18T18:11:59Z | |
dc.date.available | 2014-07-18T18:11:59Z | |
dc.date.issued | 1997-10-04 | en_US |
dc.identifier.citation | P. Honeyman, W.A. Adamson, K.W. Coffman, J.E. Janakiraman, R. Jerdonek, and J. Rees, "Provably Secure Videoconferencing," October 1997. [USENIX Security Symposium, San Antonio (January 1998)] <http://hdl.handle.net/2027.42/107926> | en_US |
dc.identifier.uri | https://hdl.handle.net/2027.42/107926 | |
dc.description.abstract | At the Center for Information Technology Integration, we are experimenting with algorithms and protocols for building secure applications. In our security testbed, we have modified VIC, an off-the-shelf videoconferencing application, to support GSS API, a generic security interface. We then layered these interfaces onto a smartcard-based key distribution algorithm and a fast cipher. These components are accompanied by rigorous mathematical proofs of security, and are accessed through narrowly-defined interfaces, which lends confidence in the strength of the security of the system as a whole. | en_US |
dc.publisher | Center for Information Technology Integration | en_US |
dc.title | Provably Secure Videoconferencing | en_US |
dc.type | Technical Report | en_US |
dc.subject.hlbsecondlevel | Computer Science | en_US |
dc.subject.hlbtoplevel | Engineering | en_US |
dc.contributor.affiliationum | Center for Information Technology Integration | en_US |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/107926/1/citi-tr-97-2.pdf | |
dc.owningcollname | Electrical Engineering and Computer Science, Department of (EECS) |
Files in this item
Remediation of Harmful Language
The University of Michigan Library aims to describe library materials in a way that respects the people and communities who create, use, and are represented in our collections. Report harmful or offensive language in catalog records, finding aids, or elsewhere in our collections anonymously through our metadata feedback form. More information at Remediation of Harmful Language.
Accessibility
If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.