Journal: IEEE Journal on Selected Areas in Communications

Volume 7, Issue 4

435 -- 447Gustavus J. Simmons. A protocol to provide verifiable proof of identity and unforgeable transaction receipts
448 -- 457Richard A. Kemmerer. Analyzing encryption protocols using formal verification techniques
458 -- 466Thomas Beth, Dieter Gollmann. Algorithm engineering for public key algorithms
467 -- 473Shigeo Tsujii, Toshiya Itoh. An ID-based cryptosystem based on the discrete logarithm problem
474 -- 480Enrico Del Re, Romano Fantacci, Damiano F. Maffucci. A new speech signal scrambling method for secure communications: theory, implementation, and security evaluation
481 -- 485Eiji Okamoto, Kazue Tanaka. Key distribution system based on identification information
486 -- 498Deborah Estrin, Jeffrey C. Mogul, Gene Tsudik. Visa protocols for controlling interorganizational datagram flow
499 -- 504Gene Tsudik. Datagram authentication in internet gateways: implications of fragmentation and dynamic routing
505 -- 516Koji Nakao, Kenji Suzuki. Proposal on a secure communications service element (SCSE) in the OSI application layer
517 -- 524Christopher Mitchell, Michael Walker, David Rush. CCITT/ISO standards for secure message handling
525 -- 533Dieter Gollmann, William G. Chambers. Clock-controlled shift registers: a review
534 -- 539Chi-Sung Laih, Jau-Yien Lee, Lein Harn, Yan-Kuin Su. Linearly shift knapsack public-key cryptosystem
540 -- 547Akira Matsunaga, Keiichiro Koga, Michihisa Ohkawa. An analog speech scrambling system using the FFT technique with high-level security
548 -- 560Chun-Meng Su, Laurence B. Milstein. Channel equalization and performance analysis of a coherent frequency hopped spread spectrum system
561 -- 568Branimir R. Vojcic, Raymond L. Pickholtz. Performance of direct sequence spread spectrum in a fading dispersive channel with jamming
569 -- 575Don J. Torrieri. Fundamental limitations on repeater jamming of frequency-hopping communications
576 -- 589Sorin Davidovici, Emmanuel G. Kanterakis. Radiometric detection of direct-sequence spread-spectrum signals using interference excision
590 -- 594Bhumip Khasnabish. A bound of deception capability in multiuser computer networks
595 -- 601David E. Reed, Mark A. Wickert. Spread spectrum signals with low probability of chip rate detection
602 -- 617William E. Snelling, Evaggelos Geraniotis. Sequential detection of unknown frequency-hopped waveforms
618 -- 626Kwok H. Li, Laurence B. Milstein. On the optimum processing gain of a block-coded direct-sequence spread-spectrum system