Science.gov

Sample records for act communications security

  1. 78 FR 46582 - Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-01

    ... COMMISSION Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council... Communications Commission's (FCC or Commission) Communications Security, Reliability, and Interoperability... to ensure the security, reliability, and interoperability of communications systems. On March...

  2. Department of Homeland Security Interoperable Communications Act

    THOMAS, 113th Congress

    Rep. Payne, Donald M., Jr. [D-NJ-10

    2014-03-24

    07/09/2014 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  3. 76 FR 72922 - Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-28

    ... COMMISSION Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council... Communications Commission's (FCC) third Communications Security, Reliability, and Interoperability Council (CSRIC... FCC regarding best practices and actions the FCC can take to ensure the security, reliability,...

  4. 75 FR 74050 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-30

    ... COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council AGENCY: Federal Communications Commission. ACTION... advises interested persons that the Federal Communications Commission's (FCC) Communications...

  5. 75 FR 9899 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-04

    ... From the Federal Register Online via the Government Publishing Office FEDERAL COMMUNICATIONS COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications... Division, Public Safety and Homeland Security Bureau, Federal Communications Commission, 445 12th...

  6. 77 FR 70777 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-27

    ... From the Federal Register Online via the Government Publishing Office FEDERAL COMMUNICATIONS COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council AGENCY: Federal Communications Commission....

  7. 77 FR 12054 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-28

    ... From the Federal Register Online via the Government Publishing Office FEDERAL COMMUNICATIONS COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications... Safety and Homeland Security Bureau, Federal Communications Commission, 445 12th Street SW., Room 7-...

  8. 76 FR 54234 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-31

    ... From the Federal Register Online via the Government Publishing Office FEDERAL COMMUNICATIONS COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications... Goldthorp, Associate Bureau Chief, Public Safety and Homeland Security Bureau, Federal...

  9. 75 FR 56533 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-16

    ... COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications... presenting their proposed recommendations on issues such as public safety consolidation, E911 reliability and... Chief for Cybersecurity and Communications Reliability Public Safety and Homeland Security...

  10. 75 FR 76465 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-08

    ... COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications... complete its work. As a significant amount of the Council's work focuses on public safety issues, it is... solutions and best practices for public safety communications and cybersecurity. Recognizing the...

  11. National Security/Emergency Preparedness and Disaster Recovery Communications Via ACTS

    NASA Technical Reports Server (NTRS)

    Pasqualino, Christopher R.; Abbe, Brian S.; Dixon, Frank

    1996-01-01

    During the period from early 1993 through 1994, the U.S. National Communication System, a government agency, sponsored the development and execution of several fixed and mobile experiments using the Advanced Communications Technology Satellite (ACTS)...The results of these experiments are described in this paper.

  12. 76 FR 10362 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-24

    ... final reports that detail recommendations to the Commission on topics including cybersecurity best.... Postal Service Mail to Jeffery Goldthorp, Associate Chief for Cybersecurity and Communications... Communications Commission. Jeffery Goldthorp, Associate Chief for Cybersecurity and Communications...

  13. Secure video communications system

    DOEpatents

    Smith, Robert L.

    1991-01-01

    A secure video communications system having at least one command network formed by a combination of subsystems. The combination of subsystems to include a video subsystem, an audio subsystem, a communications subsystem, and a control subsystem. The video communications system to be window driven and mouse operated, and having the ability to allow for secure point-to-point real-time teleconferencing.

  14. 77 FR 67815 - Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-14

    ... ISPs Working Group, Secure BGP Deployment Working Group, and E 9-1-1 Best Practices Working Group will... (email). SUPPLEMENTARY INFORMATION: The meeting will be held on December 5, 2012, from 9:00 a.m. to...

  15. Secure video communications systems

    SciTech Connect

    Smith, R.L.

    1991-10-08

    This patent describes a secure video communications system having at least one command network formed by a combination of subsystems. The combination of subsystems to include a video subsystem, an audio subsystem, a communications subsystem, and a control subsystem. The video communications system to be window driven and mouse operated, and having the ability to allow for secure point-to-point real-time teleconferencing.

  16. 77 FR 28387 - Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-14

    ... emergency alerting systems such as promoting E9-1-1 reliability and alerting platforms--Emergency Alert... 9:00 a.m. to 1:00 p.m. in the Commission Meeting Room of the Federal Communications Commission,...

  17. Practical secure quantum communications

    NASA Astrophysics Data System (ADS)

    Diamanti, Eleni

    2015-05-01

    We review recent advances in the field of quantum cryptography, focusing in particular on practical implementations of two central protocols for quantum network applications, namely key distribution and coin flipping. The former allows two parties to share secret messages with information-theoretic security, even in the presence of a malicious eavesdropper in the communication channel, which is impossible with classical resources alone. The latter enables two distrustful parties to agree on a random bit, again with information-theoretic security, and with a cheating probability lower than the one that can be reached in a classical scenario. Our implementations rely on continuous-variable technology for quantum key distribution and on a plug and play discrete-variable system for coin flipping, and necessitate a rigorous security analysis adapted to the experimental schemes and their imperfections. In both cases, we demonstrate the protocols with provable security over record long distances in optical fibers and assess the performance of our systems as well as their limitations. The reported advances offer a powerful toolbox for practical applications of secure communications within future quantum networks.

  18. Secure Chemical Facilities Act

    THOMAS, 113th Congress

    Sen. Lautenberg, Frank R. [D-NJ

    2013-01-23

    01/23/2013 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  19. Secure Chemical Facilities Act

    THOMAS, 112th Congress

    Sen. Lautenberg, Frank R. [D-NJ

    2011-03-31

    03/31/2011 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  20. Securing Cabin Baggage Act

    THOMAS, 111th Congress

    Rep. Lipinski, Daniel [D-IL-3

    2009-06-15

    06/17/2009 Referred to the Subcommittee on Transportation Security and Infrastructure Protection. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  1. Keep America Secure Act

    THOMAS, 112th Congress

    Rep. Slaughter, Louise McIntosh [D-NY-28

    2012-08-02

    09/05/2012 Referred to the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  2. Secure Visas Act

    THOMAS, 111th Congress

    Rep. Smith, Lamar [R-TX-21

    2010-03-04

    04/26/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  3. Save Social Security Act

    THOMAS, 112th Congress

    Rep. McCotter, Thaddeus G. [R-MI-11

    2011-09-12

    09/19/2011 Referred for a period ending not later than September 19, 2011, (or for a later time if the Chairman so designates) to the Subcommittee on Social Security, in each case for consideration of such provisions as fall within the jurisdiction of the subcommittee concerned. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  4. 77 FR 42175 - Securities Act Industry Guides

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-18

    ... / Wednesday, July 18, 2012 / Rules and Regulations#0;#0; ] SECURITIES AND EXCHANGE COMMISSION 17 CFR Part 229 Securities Act Industry Guides AGENCY: Securities and Exchange Commission. ACTION: Technical amendments... Engaged or to be Engaged in Significant Mining Operations (``Industry Guide 7''), of the Securities Act...

  5. Advanced Communications Technology Satellite (ACTS)

    NASA Astrophysics Data System (ADS)

    Gedney, Richard T.; Schertler, Ronald J.

    1989-06-01

    The NASA Advanced Communications Technology Satellite (ACTS) was conceived to help maintain U.S. leadership in the world's communications-satellite market. This experimental satellite is expected to be launched by NASA in 1992 and to furnish the technology necessary for establishing very small aperture terminal digital networks which provide on-demand full-mesh connectivity, and 1.544-MBPS services with only a single hop. Utilizing on-board switching and processing, each individual voice or data circuit can be separately routed to any location in the network. This paper provides an overview of the ACTS and discusses the value of the technology for future communications systems.

  6. Advanced Communications Technology Satellite (ACTS)

    NASA Technical Reports Server (NTRS)

    Gedney, Richard T.; Schertler, Ronald J.

    1989-01-01

    The NASA Advanced Communications Technology Satellite (ACTS) was conceived to help maintain U.S. leadership in the world's communications-satellite market. This experimental satellite is expected to be launched by NASA in 1992 and to furnish the technology necessary for establishing very small aperture terminal digital networks which provide on-demand full-mesh connectivity, and 1.544-MBPS services with only a single hop. Utilizing on-board switching and processing, each individual voice or data circuit can be separately routed to any location in the network. This paper provides an overview of the ACTS and discusses the value of the technology for future communications systems.

  7. 49 CFR 193.2909 - Security communications.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 3 2011-10-01 2011-10-01 false Security communications. 193.2909 Section 193.2909...: FEDERAL SAFETY STANDARDS Security § 193.2909 Security communications. A means must be provided for: (a) Prompt communications between personnel having supervisory security duties and law enforcement...

  8. 49 CFR 193.2909 - Security communications.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false Security communications. 193.2909 Section 193.2909...: FEDERAL SAFETY STANDARDS Security § 193.2909 Security communications. A means must be provided for: (a) Prompt communications between personnel having supervisory security duties and law enforcement...

  9. 49 CFR 193.2909 - Security communications.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 3 2012-10-01 2012-10-01 false Security communications. 193.2909 Section 193.2909...: FEDERAL SAFETY STANDARDS Security § 193.2909 Security communications. A means must be provided for: (a) Prompt communications between personnel having supervisory security duties and law enforcement...

  10. Advanced Communications Technology Satellite (ACTS)

    NASA Technical Reports Server (NTRS)

    Plecity, Mark S.; Nall, Mark E.

    1991-01-01

    The NASA Advanced Communications Technology Satellite (ACTS) provides high risk technologies having the potential to dramatically enhance the capabilities of the satellite communications industry. This experimental satellite, which will be launched by NASA in 1993, will furnish the technology necessary for providing a range of services. Utilizing the ACTS very-high-gain-hopping spot-beam antennas with on-board routing and processing, Very Small Aperture Terminal (VSAT) digital networks which provide on-demand, full-mesh-convectivity 1.544-MBPS services with only a single hop can be established. The high-gain spot-beam antenna at Ka-band permits wide area, flexible networks providing high data rate services between modest-size earth terminals.

  11. Secure Communication with Network Coding

    NASA Astrophysics Data System (ADS)

    Cao, Zhanghua; Tang, Yuansheng; Luo, Jinquan

    In this paper, we consider the problem of secure communication over wiretap multicast networks. Noticing that network coding renders the intermediate nodes to mix information from different data flows, we propose a secure communication scheme based on cryptographic means and network coding. Specifically, we employ a confidential cryptosystem to encrypt the source message packets, then treat the secret key as a message packet and mix the key with the obtained cryptograms. Furthermore, we can prove that, under suitable conditions, the wiretapper is unable to gain the secret key. Meanwhile, the confidential cryptosystem prohibits the wiretapper from extracting meaningful information from the obtained cryptograms. Our scheme doesn't need a private channel to transmit the secret key and enables the utilization of network capacity to reach 1 n n.

  12. Quantum secure direct communication and deterministic secure quantum communication

    NASA Astrophysics Data System (ADS)

    Long, Gui-Lu; Deng, Fu-Guo; Wang, Chuan; Li, Xi-Han; Wen, Kai; Wang, Wan-Ying

    2007-07-01

    In this review article, we review the recent development of quantum secure direct communication (QSDC) and deterministic secure quantum communication (DSQC) which both are used to transmit secret message, including the criteria for QSDC, some interesting QSDC protocols, the DSQC protocols and QSDC network, etc. The difference between these two branches of quantum communication is that DSQC requires the two parties exchange at least one bit of classical information for reading out the message in each qubit, and QSDC does not. They are attractive because they are deterministic, in particular, the QSDC protocol is fully quantum mechanical. With sophisticated quantum technology in the future, the QSDC may become more and more popular. For ensuring the safety of QSDC with single photons and quantum information sharing of single qubit in a noisy channel, a quantum privacy amplification protocol has been proposed. It involves very simple CHC operations and reduces the information leakage to a negligible small level. Moreover, with the one-party quantum error correction, a relation has been established between classical linear codes and quantum one-party codes, hence it is convenient to transfer many good classical error correction codes to the quantum world. The one-party quantum error correction codes are especially designed for quantum dense coding and related QSDC protocols based on dense coding.

  13. Multiparty-controlled quantum secure direct communication

    SciTech Connect

    Xiu, X.-M. Dong, L.; Gao, Y.-J.; Chi, F.

    2007-12-15

    A theoretical scheme of a multiparty-controlled quantum secure direct communication is proposed. The supervisor prepares a communication network with Einstein-Podolsky-Rosen pairs and auxiliary particles. After passing a security test of the communication network, a supervisor tells the users the network is secure and they can communicate. If the controllers allow the communicators to communicate, the controllers should perform measurements and inform the communicators of the outcomes. The communicators then begin to communicate after they perform a security test of the quantum channel and verify that it is secure. The recipient can decrypt the secret message in a classical message from the sender depending on the protocol. Any two users in the network can communicate through the above processes under the control of the supervisor and the controllers.

  14. Secure communications using quantum cryptography

    NASA Astrophysics Data System (ADS)

    Hughes, Richard J.; Buttler, William T.; Kwiat, Paul G.; Luther, Gabriel G.; Morgan, George L.; Nordholt, Jane E.; Peterson, C. Glen; Simmons, Charles M.

    1997-07-01

    The secure distribution of the secret random bit sequences known as `key' material, is an essential precursor to their use for the encryption and decryption of confidential communications. Quantum cryptography is an emerging technology for secure key distribution with single-photon transmissions: Heisenburg's uncertainty principle ensures that an adversary can neither successfully tap the key transmissions, nor evade detection (eavesdropping raises the key error rate above a threshold value). We have developed experimental quantum cryptography systems based on the transmission of non-orthogonal single-photon states to generate shared key material over multi-kilometer optical fiber paths and over line-of-sight links. In both cases, key material is built up using the transmission of a single- photon per bit of an initial secret random sequence. A quantum-mechanically random subset of this sequence is identified, becoming the key material after a data reconciliation stage with the sender. In our optical fiber experiment we have performed quantum key distribution over 24-km of underground optical fiber using single-photon interference states, demonstrating that secure, real-time key generation over `open' multi-km node-to-node optical fiber communications links is possible.

  15. Secure communications using quantum cryptography

    SciTech Connect

    Hughes, R.J.; Buttler, W.T.; Kwiat, P.G.

    1997-08-01

    The secure distribution of the secret random bit sequences known as {open_quotes}key{close_quotes} material, is an essential precursor to their use for the encryption and decryption of confidential communications. Quantum cryptography is an emerging technology for secure key distribution with single-photon transmissions, nor evade detection (eavesdropping raises the key error rate above a threshold value). We have developed experimental quantum cryptography systems based on the transmission of non-orthogonal single-photon states to generate shared key material over multi-kilometer optical fiber paths and over line-of-sight links. In both cases, key material is built up using the transmission of a single-photon per bit of an initial secret random sequence. A quantum-mechanically random subset of this sequence is identified, becoming the key material after a data reconciliation stage with the sender. In our optical fiber experiment we have performed quantum key distribution over 24-km of underground optical fiber using single-photon interference states, demonstrating that secure, real-time key generation over {open_quotes}open{close_quotes} multi-km node-to-node optical fiber communications links is possible. We have also constructed a quantum key distribution system for free-space, line-of-sight transmission using single-photon polarization states, which is currently undergoing laboratory testing. 7 figs.

  16. Aerospace Communications Security Technologies Demonstrated

    NASA Technical Reports Server (NTRS)

    Griner, James H.; Martzaklis, Konstantinos S.

    2003-01-01

    In light of the events of September 11, 2001, NASA senior management requested an investigation of technologies and concepts to enhance aviation security. The investigation was to focus on near-term technologies that could be demonstrated within 90 days and implemented in less than 2 years. In response to this request, an internal NASA Glenn Research Center Communications, Navigation, and Surveillance Aviation Security Tiger Team was assembled. The 2-year plan developed by the team included an investigation of multiple aviation security concepts, multiple aircraft platforms, and extensively leveraged datalink communications technologies. It incorporated industry partners from NASA's Graphical Weather-in-the-Cockpit research, which is within NASA's Aviation Safety Program. Two concepts from the plan were selected for demonstration: remote "black box," and cockpit/cabin surveillance. The remote "black box" concept involves real-time downlinking of aircraft parameters for remote monitoring and archiving of aircraft data, which would assure access to the data following the loss or inaccessibility of an aircraft. The cockpit/cabin surveillance concept involves remote audio and/or visual surveillance of cockpit and cabin activity, which would allow immediate response to any security breach and would serve as a possible deterrent to such breaches. The datalink selected for the demonstrations was VDL Mode 2 (VHF digital link), the first digital datalink for air-ground communications designed for aircraft use. VDL Mode 2 is beginning to be implemented through the deployment of ground stations and aircraft avionics installations, with the goal of being operational in 2 years. The first demonstration was performed December 3, 2001, onboard the LearJet 25 at Glenn. NASA worked with Honeywell, Inc., for the broadcast VDL Mode 2 datalink capability and with actual Boeing 757 aircraft data. This demonstration used a cockpitmounted camera for video surveillance and a coupling to

  17. National Security Agency Accountability Act

    THOMAS, 113th Congress

    Rep. Carney, John C., Jr. [D-DE-At Large

    2014-01-15

    03/20/2014 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  18. Transportation Security Administration Authorization Act

    THOMAS, 111th Congress

    Rep. King, Peter T. [R-NY-3

    2010-06-24

    07/26/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  19. Airport Security Act of 2013

    THOMAS, 113th Congress

    Rep. Johnson, Henry C. "Hank," Jr. [D-GA-4

    2013-11-14

    01/09/2014 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  20. Secure Federal File Sharing Act

    THOMAS, 111th Congress

    Sen. McCaskill, Claire [D-MO

    2010-06-14

    06/14/2010 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  1. Secure Data Act of 2014

    THOMAS, 113th Congress

    Rep. Lofgren, Zoe [D-CA-19

    2014-12-04

    12/18/2014 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  2. Secure Firearms Act of 2013

    THOMAS, 113th Congress

    Rep. Carter, John R. [R-TX-31

    2013-05-08

    06/14/2013 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  3. Increasing security in inter-chip communication

    DOEpatents

    Edwards, Nathan J; Hamlet, Jason; Bauer, Todd; Helinski, Ryan

    2014-10-28

    An apparatus for increasing security in inter-chip communication includes a sending control module, a communication bus, and a receiving control module. The communication bus is coupled between the sending control module and the receiving control module. The sending control module operates to send data on the communication bus, disable the communication bus when threats are detected, or both.

  4. Cyber Security Domestic Preparedness Act

    THOMAS, 111th Congress

    Rep. Rodriguez, Ciro D. [D-TX-23

    2010-01-26

    01/28/2010 Referred to the Subcommittee on Emergency Communications, Preparedness, and Response. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  5. Secure Border Act of 2012

    THOMAS, 112th Congress

    Rep. Miller, Candice S. [R-MI-10

    2011-03-31

    06/04/2012 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  6. Secure Federal File Sharing Act

    THOMAS, 111th Congress

    Rep. Towns, Edolphus [D-NY-10

    2009-11-17

    03/25/2010 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  7. 49 CFR 193.2909 - Security communications.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) PIPELINE SAFETY LIQUEFIED NATURAL GAS FACILITIES...) Prompt communications between personnel having supervisory security duties and law enforcement...

  8. 47 CFR 32.4 - Communications Act.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 2 2010-10-01 2010-10-01 false Communications Act. 32.4 Section 32.4 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES UNIFORM SYSTEM OF ACCOUNTS FOR TELECOMMUNICATIONS COMPANIES Preface § 32.4 Communications Act. Attention is directed to...

  9. 47 CFR 32.4 - Communications Act.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 2 2012-10-01 2012-10-01 false Communications Act. 32.4 Section 32.4 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES UNIFORM SYSTEM OF ACCOUNTS FOR TELECOMMUNICATIONS COMPANIES Preface § 32.4 Communications Act. Attention is directed to...

  10. 47 CFR 32.4 - Communications Act.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 2 2014-10-01 2014-10-01 false Communications Act. 32.4 Section 32.4 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES UNIFORM SYSTEM OF ACCOUNTS FOR TELECOMMUNICATIONS COMPANIES Preface § 32.4 Communications Act. Attention is directed to...

  11. 47 CFR 32.4 - Communications Act.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 2 2011-10-01 2011-10-01 false Communications Act. 32.4 Section 32.4 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES UNIFORM SYSTEM OF ACCOUNTS FOR TELECOMMUNICATIONS COMPANIES Preface § 32.4 Communications Act. Attention is directed to...

  12. 47 CFR 32.4 - Communications Act.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 2 2013-10-01 2013-10-01 false Communications Act. 32.4 Section 32.4 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES UNIFORM SYSTEM OF ACCOUNTS FOR TELECOMMUNICATIONS COMPANIES Preface § 32.4 Communications Act. Attention is directed to...

  13. Classical noise, quantum noise and secure communication

    NASA Astrophysics Data System (ADS)

    Tannous, C.; Langlois, J.

    2016-01-01

    Secure communication based on message encryption might be performed by combining the message with controlled noise (called pseudo-noise) as performed in spread-spectrum communication used presently in Wi-Fi and smartphone telecommunication systems. Quantum communication based on entanglement is another route for securing communications as demonstrated by several important experiments described in this work. The central role played by the photon in unifying the description of classical and quantum noise as major ingredients of secure communication systems is highlighted and described on the basis of the classical and quantum fluctuation dissipation theorems.

  14. Scientific communication and national security

    NASA Astrophysics Data System (ADS)

    Richman, Barbara T.

    The need for scientists to disseminate widely their research results often conflicts with the United States government's requirement that certain information be withheld from foreign adversaries. The Reagan administration has stepped up its campaign to clamp down on the transfer of scientific and technological information from the United States that might be used by foreign nations to gain military advantages. As a result, some scientists have become alarmed that they will be forced to forfeit essential rights to communicate freely. In light of the growing concern from both sides a panel of 18 senior policymakers and researchers has been assembled by the National Academy of Sciences to examine the relationship between university research and national security. The panel held its first meeting on April 16 and 17; an interim report is expected in September, followed by a final report in March 1983.

  15. Secure communication via quantum illumination

    NASA Astrophysics Data System (ADS)

    Shapiro, Jeffrey H.; Zhang, Zheshen; Wong, Franco N. C.

    2014-10-01

    In the quantum illumination protocol for secure communication, Alice prepares entangled signal and idler beams via spontaneous parametric downconversion. She sends the signal beam to Bob, while retaining the idler. Bob imposes message modulation on the beam he receives from Alice, amplifies it, and sends it back to her. Alice then decodes Bob's information by making a joint quantum measurement on the light she has retained and the light she has received from him. The basic performance analysis for this protocol—which demonstrates its immunity to passive eavesdropping, in which Eve can only listen to Alice and Bob's transmissions—is reviewed, along with the results of its first proof-of-principle experiment. Further analysis is then presented, showing that secure data rates in excess of 1 Gbps may be possible over 20-km-long fiber links with technology that is available or under development. Finally, an initial scheme for thwarting active eavesdropping, in which Eve injects her own light into Bob's terminal, is proposed and analyzed.

  16. DOE Integrated Security System (DISS) preliminary communication security analysis

    SciTech Connect

    Sweeney, D.J.

    1993-10-01

    The purpose of this analysis is to document a technical approach to improve DOE Integrated Security System (DISS) dial-up communications security and the requirements to address them. This document is not intended as a comprehensive analysis of the security aspects of the DISS computer system but rather as an analysis of the dial-up communications security as it pertains to the use of the DISS database in the new DOE Automated Visitors Access Control System (DAVACS) procedures. Current access controls into the DISS will be discussed with emphasis on the DAVACS procedures. Recommendations will be provided for increasing the dial-up communications security into DISS as it relates to the automated visit procedures. Finally a design for an encrypted dial-up communication link to DISS will be given.

  17. Framework for Flexible Security in Group Communications

    NASA Technical Reports Server (NTRS)

    McDaniel, Patrick; Prakash, Atul

    2006-01-01

    The Antigone software system defines a framework for the flexible definition and implementation of security policies in group communication systems. Antigone does not dictate the available security policies, but provides high-level mechanisms for implementing them. A central element of the Antigone architecture is a suite of such mechanisms comprising micro-protocols that provide the basic services needed by secure groups.

  18. 17 CFR 229.801 - Securities Act industry guides.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Securities Act industry guides. 229.801 Section 229.801 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD... AND CONSERVATION ACT OF 1975-REGULATION S-K List of Industry Guides § 229.801 Securities Act...

  19. An Open Hearing on the Communications Act.

    ERIC Educational Resources Information Center

    Journal of Library Automation, 1979

    1979-01-01

    Edited text of the proceedings on the Communications Act conducted by the Library and Information Technology Association (LITA), in which representatives from the library community engaged in dialogue with staff from the House Subcommittee responsible for rewriting the Communications Act. (CWM)

  20. NASA's Advanced Communications Technology Satellite (ACTS)

    NASA Technical Reports Server (NTRS)

    Gedney, R. T.

    1983-01-01

    NASA recently restructured its Space Communications Program to emphasize the development of high risk communication technology useable in multiple frequency bands and to support a wide range of future communication needs. As part of this restructuring, the Advanced Communications Technology Satellite (ACTS) Project will develop and experimentally verify the technology associated with multiple fixed and scanning beam systems which will enable growth in communication satellite capacities and more effective utilization of the radio frequency spectrum. The ACTS requirements and operations as well as the technology significance for future systems are described.

  1. Advanced Communications Technology Satellite (ACTS)

    NASA Technical Reports Server (NTRS)

    Schertler, Ronald J.; Gedney, Richard T.

    1992-01-01

    An overview of the NASA ACTS program is presented. The key technologies of ACTS include spot beams, on-board baseband processing and routing, wide bandwidth (900 MHz), and Ka-band transponders. The discussion covers system description, current status of the spacecraft development, ACTS earth stations, NGS traffic terminal, USAT, land and aeronautical mobiles, high data rate and propagation receive only terminals, and ACTS experiments program.

  2. Campus Security Act & Students' Right To Know.

    ERIC Educational Resources Information Center

    Ramirez, Gus

    In November 1990, the Students' Right to Know and Campus Security Act became law, requiring all postsecondary institutions that receive federal student aid to collect campus crime statistics and make timely reports to the campus community on crimes that are considered a threat to other students and other employees. The law also requires that…

  3. Energy Independence and Security Act of 2007

    SciTech Connect

    2011-12-30

    An Act passed in 2007 to move the United States toward greater energy independence and security, to increase the production of clean renewable fuels, to protect consumers, to increase the efficiency of products, buildings, and vehicles, to promote research on and deploy greenhouse gas capture and storage options, and to improve the energy performance of the Federal Government, and for other purposes.

  4. Communication security in open health care networks.

    PubMed

    Blobel, B; Pharow, P; Engel, K; Spiegel, V; Krohn, R

    1999-01-01

    Fulfilling the shared care paradigm, health care networks providing open systems' interoperability in health care are needed. Such communicating and co-operating health information systems, dealing with sensitive personal medical information across organisational, regional, national or even international boundaries, require appropriate security solutions. Based on the generic security model, within the European MEDSEC project an open approach for secure EDI like HL7, EDIFACT, XDT or XML has been developed. The consideration includes both securing the message in an unsecure network and the transport of the unprotected information via secure channels (SSL, TLS etc.). Regarding EDI, an open and widely usable security solution has been specified and practically implemented for the examples of secure mailing and secure file transfer (FTP) via wrapping the sensitive information expressed by the corresponding protocols. The results are currently prepared for standardisation. PMID:10724890

  5. 76 FR 23810 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Emergency Response...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-28

    ... COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Emergency Response Interoperability Center Public Safety Advisory Committee Meeting AGENCY: Federal Communications Commission. ACTION... advises interested persons that the FCC Emergency Response Interoperability Center Public Safety...

  6. 76 FR 10898 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Emergency Response...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-28

    ... COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Emergency Response Interoperability Center Public Safety Advisory Committee Meeting AGENCY: Federal Communications Commission. ACTION... advises interested persons that the FCC Emergency Response Interoperability Center Public Safety...

  7. 77 FR 36292 - Notice Pursuant to the National Cooperative Research and Production Act of 1993-Border Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-18

    ... Antitrust Division Notice Pursuant to the National Cooperative Research and Production Act of 1993--Border...''), Border Security Technology Consortium (``BSTC'') has filed written notifications simultaneously with the... various border security-related monitoring, surveillance, communications, fencing and infrastructure,...

  8. Secure direct communication based on secret transmitting order of particles

    SciTech Connect

    Zhu Aidong; Zhang Shou; Xia Yan; Fan Qiubo

    2006-02-15

    We propose the schemes of quantum secure direct communication based on a secret transmitting order of particles. In these protocols, the secret transmitting order of particles ensures the security of communication, and no secret messages are leaked even if the communication is interrupted for security. This strategy of security for communication is also generalized to a quantum dialogue. It not only ensures the unconditional security but also improves the efficiency of communication.

  9. 17 CFR 229.801 - Securities Act industry guides.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    .... 229.801 Section 229.801 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY... relating to interests in oil and gas programs. (e) Guide 5. Preparation of registration statements...

  10. 17 CFR 229.801 - Securities Act industry guides.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    .... 229.801 Section 229.801 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY... relating to interests in oil and gas programs. (e) Guide 5. Preparation of registration statements...

  11. 17 CFR 229.801 - Securities Act industry guides.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    .... 229.801 Section 229.801 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY... relating to interests in oil and gas programs. (e) Guide 5. Preparation of registration statements...

  12. 17 CFR 229.801 - Securities Act industry guides.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    .... 229.801 Section 229.801 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY... relating to interests in oil and gas programs. (e) Guide 5. Preparation of registration statements...

  13. Secure quantum communication using classical correlated channel

    NASA Astrophysics Data System (ADS)

    Costa, D.; de Almeida, N. G.; Villas-Boas, C. J.

    2016-07-01

    We propose a secure protocol to send quantum information from one part to another without a quantum channel. In our protocol, which resembles quantum teleportation, a sender (Alice) and a receiver (Bob) share classical correlated states instead of EPR ones, with Alice performing measurements in two different bases and then communicating her results to Bob through a classical channel. Our secure quantum communication protocol requires the same amount of classical bits as the standard quantum teleportation protocol. In our scheme, as in the usual quantum teleportation protocol, once the classical channel is established in a secure way, a spy (Eve) will never be able to recover the information of the unknown quantum state, even if she is aware of Alice's measurement results. Security, advantages, and limitations of our protocol are discussed and compared with the standard quantum teleportation protocol.

  14. 78 FR 20705 - Securities Act of 1933; Securities Exchange Act of 1934; Order Regarding Review of FASB...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-05

    ... From the Federal Register Online via the Government Publishing Office SECURITIES AND EXCHANGE COMMISSION Securities Act of 1933; Securities Exchange Act of 1934; Order Regarding Review of FASB Accounting Support Fee for 2013 Under Section 109 of the Sarbanes-Oxley Act of 2002 April 2, 2013. The...

  15. 77 FR 14843 - [Securities Act of 1933; Release No. 9300/March 7, 2012; Securities Exchange Act of 1934; Release...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-13

    ... From the Federal Register Online via the Government Publishing Office SECURITIES AND EXCHANGE COMMISSION [Securities Act of 1933; Release No. 9300/March 7, 2012; Securities Exchange Act of 1934; Release No. 66529/March 7, 2012] Order Regarding Review of FASB Accounting Support Fee for 2012 Under Section 109 of the Sarbanes-Oxley Act of 2002...

  16. The NASA Advanced Communications Technology Satellite (ACTS)

    NASA Astrophysics Data System (ADS)

    Beck, G. A.

    1984-10-01

    Forecasts indicate that a saturation of the capacity of the satellite communications service will occur in the U.S. domestic market by the early 1990s. In order to prevent this from happening, advanced technologies must be developed. NASA has been concerned with such a development. One key is the exploitation of the Ka-band (30/20 GHz), which is much wider than C- and Ku-bands together. Another is the use of multiple narrow antenna beams in the satellite to achieve large frequency reuse factors with very high antenna gains. NASA has developed proof-of-concept hardware components which form the basis for a flight demonstration. The Advanced Communications Technology Satellite (ACTS) system will provide this demonstration. Attention is given to the ACTS Program definition, the ACTS Flight System, the Multibeam Communications Package, and the spacecraft bus.

  17. Striking Down the Communications Decency Act.

    ERIC Educational Resources Information Center

    Russo, Charles J.

    1998-01-01

    The Supreme Court's decision in "Reno," striking down major portions of the Communications Decency Act of 1996, pits the need to protect children from inappropriate material against the need to maintain free Internet access by adults. Highlights major points in the holding and discusses the meaning of "Reno" for educators. (MLF)

  18. Efficient Controlled Quantum Secure Direct Communication Protocols

    NASA Astrophysics Data System (ADS)

    Patwardhan, Siddharth; Moulick, Subhayan Roy; Panigrahi, Prasanta K.

    2016-03-01

    We study controlled quantum secure direct communication (CQSDC), a cryptographic scheme where a sender can send a secret bit-string to an intended recipient, without any secure classical channel, who can obtain the complete bit-string only with the permission of a controller. We report an efficient protocol to realize CQSDC using Cluster state and then go on to construct a (2-3)-CQSDC using Brown state, where a coalition of any two of the three controllers is required to retrieve the complete message. We argue both protocols to be unconditionally secure and analyze the efficiency of the protocols to show it to outperform the existing schemes while maintaining the same security specifications.

  19. Efficient Controlled Quantum Secure Direct Communication Protocols

    NASA Astrophysics Data System (ADS)

    Patwardhan, Siddharth; Moulick, Subhayan Roy; Panigrahi, Prasanta K.

    2016-07-01

    We study controlled quantum secure direct communication (CQSDC), a cryptographic scheme where a sender can send a secret bit-string to an intended recipient, without any secure classical channel, who can obtain the complete bit-string only with the permission of a controller. We report an efficient protocol to realize CQSDC using Cluster state and then go on to construct a (2-3)-CQSDC using Brown state, where a coalition of any two of the three controllers is required to retrieve the complete message. We argue both protocols to be unconditionally secure and analyze the efficiency of the protocols to show it to outperform the existing schemes while maintaining the same security specifications.

  20. Security model for picture archiving and communication systems.

    PubMed

    Harding, D B; Gac, R J; Reynolds, C T; Romlein, J; Chacko, A K

    2000-05-01

    The modern information revolution has facilitated a metamorphosis of health care delivery wrought with the challenges of securing patient sensitive data. To accommodate this reality, Congress passed the Health Insurance Portability and Accountability Act (HIPAA). While final guidance has not fully been resolved at this time, it is up to the health care community to develop and implement comprehensive security strategies founded on procedural, hardware and software solutions in preparation for future controls. The Virtual Radiology Environment (VRE) Project, a landmark US Army picture archiving and communications system (PACS) implemented across 10 geographically dispersed medical facilities, has addressed that challenge by planning for the secure transmission of medical images and reports over their local (LAN) and wide area network (WAN) infrastructure. Their model, which is transferable to general PACS implementations, encompasses a strategy of application risk and dataflow identification, data auditing, security policy definition, and procedural controls. When combined with hardware and software solutions that are both non-performance limiting and scalable, the comprehensive approach will not only sufficiently address the current security requirements, but also accommodate the natural evolution of the enterprise security model. PMID:10847401

  1. 3 CFR - The Energy Independence and Security Act of 2007

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 3 The President 1 2010-01-01 2010-01-01 false The Energy Independence and Security Act of 2007 Presidential Documents Other Presidential Documents Memorandum of January 26, 2009 The Energy Independence and Security Act of 2007 Memorandum for the Secretary of Transportation the Administrator of the...

  2. Entanglement enhances security in quantum communication

    SciTech Connect

    Demkowicz-Dobrzanski, Rafal; Sen, Aditi; Sen, Ujjwal; Lewenstein, Maciej

    2009-07-15

    Secret sharing is a protocol in which a 'boss' wants to send a classical message secretly to two 'subordinates', such that none of the subordinates is able to know the message alone, while they can find it if they cooperate. Quantum mechanics is known to allow for such a possibility. We analyze tolerable quantum bit error rates in such secret sharing protocols in the physically relevant case when the eavesdropping is local with respect to the two channels of information transfer from the boss to the two subordinates. We find that using entangled encoding states is advantageous to legitimate users of the protocol. We therefore find that entanglement is useful for secure quantum communication. We also find that bound entangled states with positive partial transpose are not useful as a local eavesdropping resource. Moreover, we provide a criterion for security in secret sharing--a parallel of the Csiszar-Koerner criterion in single-receiver classical cryptography.

  3. 76 FR 49698 - Covered Securities Pursuant to Section 18 of the Securities Act of 1933

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-11

    ... Exchange Act Release No. 58673 (September 29, 2008), 73 FR 57707 (October 3, 2008) (SR-NYSE- 2008-60 and SR... NYSE Amex LLC (``NYSE Amex''). See Securities Exchange Act Release No. 59575 (March 13, 2009), 74 FR... Securities Exchange Act Release Nos. 53799 (May 12, 2006), 71 FR 29195 (May 19, 2006) and 54071 (June...

  4. 77 FR 70796 - Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-27

    ... following Privacy Act system of records notice, DHS/TSA-017 Secure Flight Test Records (June 22, 2005, 70 FR.../Transportation Security Administration- 019, Secure Flight Records (November 9, 2007, 72 FR 63711) to cover the...)-017 Secure Flight Test Records (June 22, 2005, 70 FR 36320), from its inventory of record systems....

  5. Security aspects of RFID communication systems

    NASA Astrophysics Data System (ADS)

    Bîndar, Valericǎ; Popescu, Mircea; Bǎrtuşicǎ, Rǎzvan; Craciunescu, Razvan; Halunga, Simona

    2015-02-01

    The objective of this study is to provide an overview of basic technical elements and security risks of RFID communication systems and to analyze the possible threats arising from the use of RFID systems. A number of measurements are performed on a communication system including RFID transponder and the tag reader, and it has been determined that the uplink signal level is 62 dB larger than the average value of the noise at the distance of 1m from the tag, therefore the shielding effectiveness has to exceed this threshold. Next, the card has been covered with several shielding materials and measurements were carried, under similar conditions to test the recovery of compromising signals. A very simple protection measure to prevent unauthorized reading of the data stored on the card has been proposed, and some electromagnetic shielding materials have been proposed and tested.

  6. Multiparty Controlled Deterministic Secure Quantum Communication Through Entanglement Swapping

    NASA Astrophysics Data System (ADS)

    Dong, Li; Xiu, Xiao-Ming; Gao, Ya-Jun; Chi, Feng

    A three-party controlled deterministic secure quantum communication scheme through entanglement swapping is proposed firstly. In the scheme, the sender needs to prepare a class of Greenberger-Horne-Zeilinger (GHZ) states which are used as quantum channel. The two communicators may securely communicate under the control of the controller if the quantum channel is safe. The roles of the sender, the receiver, and the controller can be exchanged owing to the symmetry of the quantum channel. Different from other controlled quantum secure communication schemes, the scheme needs lesser additional classical information for transferring secret information. Finally, it is generalized to a multiparty controlled deterministic secure quantum communication scheme.

  7. Wireless sensor systems for sense/decide/act/communicate.

    SciTech Connect

    Berry, Nina M.; Cushner, Adam; Baker, James A.; Davis, Jesse Zehring; Stark, Douglas P.; Ko, Teresa H.; Kyker, Ronald D.; Stinnett, Regan White; Pate, Ronald C.; Van Dyke, Colin; Kyckelhahn, Brian

    2003-12-01

    After 9/11, the United States (U.S.) was suddenly pushed into challenging situations they could no longer ignore as simple spectators. The War on Terrorism (WoT) was suddenly ignited and no one knows when this war will end. While the government is exploring many existing and potential technologies, the area of wireless Sensor networks (WSN) has emerged as a foundation for establish future national security. Unlike other technologies, WSN could provide virtual presence capabilities needed for precision awareness and response in military, intelligence, and homeland security applications. The Advance Concept Group (ACG) vision of Sense/Decide/Act/Communicate (SDAC) sensor system is an instantiation of the WSN concept that takes a 'systems of systems' view. Each sensing nodes will exhibit the ability to: Sense the environment around them, Decide as a collective what the situation of their environment is, Act in an intelligent and coordinated manner in response to this situational determination, and Communicate their actions amongst each other and to a human command. This LDRD report provides a review of the research and development done to bring the SDAC vision closer to reality.

  8. Chemical Facility Security Improvement Act of 2013

    THOMAS, 113th Congress

    Rep. Jackson Lee, Sheila [D-TX-18

    2013-01-03

    02/12/2013 Referred to the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  9. Security Clearance Reform Act of 2014

    THOMAS, 113th Congress

    Rep. Lynch, Stephen F. [D-MA-8

    2014-02-10

    03/20/2014 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  10. Border Security Enforcement Act of 2011

    THOMAS, 112th Congress

    Sen. McCain, John [R-AZ

    2011-04-13

    04/13/2011 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  11. Expansion of National Security Agency Oversight Act

    THOMAS, 113th Congress

    Rep. Carney, John C., Jr. [D-DE-At Large

    2014-01-15

    03/20/2014 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  12. Border Security Results Act of 2013

    THOMAS, 113th Congress

    Sen. Cornyn, John [R-TX

    2013-04-09

    04/09/2013 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  13. 17 CFR 240.0-10 - Small entities under the Securities Exchange Act for purposes of the Regulatory Flexibility Act.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Small entities under the Securities Exchange Act for purposes of the Regulatory Flexibility Act. 240.0-10 Section 240.0-10 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules...

  14. Lightweight and scalable secure communication in VANET

    NASA Astrophysics Data System (ADS)

    Zhu, Xiaoling; Lu, Yang; Zhu, Xiaojuan; Qiu, Shuwei

    2015-05-01

    To avoid a message to be tempered and forged in vehicular ad hoc network (VANET), the digital signature method is adopted by IEEE1609.2. However, the costs of the method are excessively high for large-scale networks. The paper efficiently copes with the issue with a secure communication framework by introducing some lightweight cryptography primitives. In our framework, point-to-point and broadcast communications for vehicle-to-infrastructure (V2I) and vehicle-to-vehicle (V2V) are studied, mainly based on symmetric cryptography. A new issue incurred is symmetric key management. Thus, we develop key distribution and agreement protocols for two-party key and group key under different environments, whether a road side unit (RSU) is deployed or not. The analysis shows that our protocols provide confidentiality, authentication, perfect forward secrecy, forward secrecy and backward secrecy. The proposed group key agreement protocol especially solves the key leak problem caused by members joining or leaving in existing key agreement protocols. Due to aggregated signature and substitution of XOR for point addition, the average computation and communication costs do not significantly increase with the increase in the number of vehicles; hence, our framework provides good scalability.

  15. Advanced Shipboard Communications Demonstrations with ACTS

    NASA Technical Reports Server (NTRS)

    Axford, Roy A.; Jedrey, Thomas C.; Rupar, Michael A.

    2000-01-01

    For ships at sea. satellites provide the only option for high data rate (HDR), long haul communications. Furthermore the demand for HDR satellite communications (SATCOM) for military and commercial ships. and other offshore platforms is increasing. Presently the bulk of this maritime HDR SATCOM connectivity is provided via C-band and X-band. However, the shipboard antenna sizes required to achieve a data rate of, say T 1 (1.544 Mbps) with present C-/X-band SATCOM systems range from seven to ten feet in diameter. This limits the classes of ships to which HDR services can be provided to those which are large enough to accommodate the massive antennas. With its high powered K/Ka-band spot beams, the National Aeronautics and Space Administration's (NASA) Advanced Communications Technology Satellite (ACTS) was able to provide T I and higher rate services to ships at sea using much smaller shipboard antennas. This paper discusses three shipboard HDR SATCOM demonstrations that were conducted with ACTS between 1996 and 1998. The first demonstration involved a 2 Mbps link provided to the seismic survey ship MN Geco Diamond equipped with a 16-inch wide, 4.5-inch tall, mechanically steered slotted waveguide array antenna developed by the Jet Propulsion Laboratory. In this February 1996 demonstration ACTS allowed supercomputers ashore to process Geco Diamond's voluminous oceanographic seismic data in near real time. This capability allowed the ship to adjust its search parameters on a daily basis based on feedback from the processed data, thereby greatly increasing survey efficiency. The second demonstration was conducted on the US Navy cruiser USS Princeton (CG 59) with the same antenna used on Geco Diamond. Princeton conducted a six-month (January-July 1997) Western Hemisphere solo deployment during which time T1 connectivity via ACTS provided the ship with a range of valuable tools for operational, administrative and quality-of-life tasks. In one instance, video

  16. Secure electronic commerce communication system based on CA

    NASA Astrophysics Data System (ADS)

    Chen, Deyun; Zhang, Junfeng; Pei, Shujun

    2001-07-01

    In this paper, we introduce the situation of electronic commercial security, then we analyze the working process and security for SSL protocol. At last, we propose a secure electronic commerce communication system based on CA. The system provide secure services such as encryption, integer, peer authentication and non-repudiation for application layer communication software of browser clients' and web server. The system can implement automatic allocation and united management of key through setting up the CA in the network.

  17. 17 CFR 239.31 - Form F-1, registration statement under the Securities Act of 1933 for securities of certain...

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Form F-1, registration statement under the Securities Act of 1933 for securities of certain foreign private issuers. 239.31 Section 239.31 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION FORMS PRESCRIBED UNDER THE SECURITIES ACT OF 1933 Forms...

  18. 75 FR 28042 - Privacy Act of 1974: System of Records; Department of Homeland Security Transportation Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-19

    ... Transportation Security Enforcement Record System (69 FR 71828, December 10, 2004.) TSA's mission is to protect... rule published on August 4, 2006 in 71 FR 44223. II. Privacy Act The Privacy Act embodies fair... records is also based on ``need to know.'' Electronic access is limited by computer security measures...

  19. Random digital encryption secure communication system

    NASA Technical Reports Server (NTRS)

    Doland, G. D. (Inventor)

    1982-01-01

    The design of a secure communication system is described. A product code, formed from two pseudorandom sequences of digital bits, is used to encipher or scramble data prior to transmission. The two pseudorandom sequences are periodically changed at intervals before they have had time to repeat. One of the two sequences is transmitted continuously with the scrambled data for synchronization. In the receiver portion of the system, the incoming signal is compared with one of two locally generated pseudorandom sequences until correspondence between the sequences is obtained. At this time, the two locally generated sequences are formed into a product code which deciphers the data from the incoming signal. Provision is made to ensure synchronization of the transmitting and receiving portions of the system.

  20. Secure communication based on spatiotemporal chaos

    NASA Astrophysics Data System (ADS)

    Ren, Hai-Peng; Bai, Chao

    2015-08-01

    In this paper, we propose a novel approach to secure communication based on spatiotemporal chaos. At the transmitter end, the state variables of the coupled map lattice system are divided into two groups: one is used as the key to encrypt the plaintext in the N-shift encryption function, and the other is used to mix with the output of the N-shift function to further confuse the information to transmit. At the receiver end, the receiver lattices are driven by the received signal to synchronize with the transmitter lattices and an inverse procedure of the encoding is conducted to decode the information. Numerical simulation and experiment based on the TI TMS320C6713 Digital Signal Processor (DSP) show the feasibility and the validity of the proposed scheme. Project supported by the National Natural Science Foundation of China (Grant No. 61172070) and the Funds from the Science and Technology Innovation Team of Shaanxi Province, China (Grant No. 2013CKT-04).

  1. Federal Information Security Amendments Act of 2012

    THOMAS, 112th Congress

    Rep. Issa, Darrell E. [R-CA-49

    2012-03-26

    05/07/2012 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  2. Federal Information Security Amendments Act of 2013

    THOMAS, 113th Congress

    Rep. Issa, Darrell E. [R-CA-49

    2013-03-14

    04/17/2013 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Notes: For further action, see S.2521, which became Public Law 113-283 on 12/18/2014. Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  3. Gerardo Hernandez Airport Security Act of 2014

    THOMAS, 113th Congress

    Rep. Hudson, Richard [R-NC-8

    2014-06-05

    07/23/2014 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  4. Strengthening Domestic Nuclear Security Act of 2014

    THOMAS, 113th Congress

    Rep. Meehan, Patrick [R-PA-7

    2014-09-18

    12/03/2014 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  5. Safe and Secure America Act of 2009

    THOMAS, 111th Congress

    Rep. Smith, Lamar [R-TX-21

    2009-03-12

    04/27/2009 Referred to the Subcommittee on Crime, Terrorism, and Homeland Security. (All Actions) Notes: For further action, see H.R.3961, which became Public Law 111-141 on 2/27/2010. Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  6. Security in Bonding Act of 2012

    THOMAS, 112th Congress

    Rep. Hanna, Richard L. [R-NY-24

    2011-12-01

    05/16/2012 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  7. Secure Wireless Communications via Cooperative Transmitting

    PubMed Central

    Stojanovski, Toni Draganov; Marina, Ninoslav

    2014-01-01

    Information-theoretic secrecy is combined with cryptographic secrecy to create a secret-key exchange protocol for wireless networks. A network of transmitters, which already have cryptographically secured channels between them, cooperate to exchange a secret key with a new receiver at a random location, in the presence of passive eavesdroppers at unknown locations. Two spatial point processes, homogeneous Poisson process and independent uniformly distributed points, are used for the spatial distributions of transmitters and eavesdroppers. We analyse the impact of the number of cooperating transmitters and the number of eavesdroppers on the area fraction where secure communication is possible. Upper bounds on the probability of existence of positive secrecy between the cooperating transmitters and the receiver are derived. The closeness of the upper bounds to the real value is then estimated by means of numerical simulations. Simulations also indicate that a deterministic spatial distribution for the transmitters, for example, hexagonal and square lattices, increases the probability of existence of positive secrecy capacity compared to the random spatial distributions. For the same number of friendly nodes, cooperative transmitting provides a dramatically larger secrecy region than cooperative jamming and cooperative relaying. PMID:24711735

  8. Secure wireless communications via cooperative transmitting.

    PubMed

    Stojanovski, Toni Draganov; Marina, Ninoslav

    2014-01-01

    Information-theoretic secrecy is combined with cryptographic secrecy to create a secret-key exchange protocol for wireless networks. A network of transmitters, which already have cryptographically secured channels between them, cooperate to exchange a secret key with a new receiver at a random location, in the presence of passive eavesdroppers at unknown locations. Two spatial point processes, homogeneous Poisson process and independent uniformly distributed points, are used for the spatial distributions of transmitters and eavesdroppers. We analyse the impact of the number of cooperating transmitters and the number of eavesdroppers on the area fraction where secure communication is possible. Upper bounds on the probability of existence of positive secrecy between the cooperating transmitters and the receiver are derived. The closeness of the upper bounds to the real value is then estimated by means of numerical simulations. Simulations also indicate that a deterministic spatial distribution for the transmitters, for example, hexagonal and square lattices, increases the probability of existence of positive secrecy capacity compared to the random spatial distributions. For the same number of friendly nodes, cooperative transmitting provides a dramatically larger secrecy region than cooperative jamming and cooperative relaying. PMID:24711735

  9. Entanglement enhances security in quantum communication

    NASA Astrophysics Data System (ADS)

    Demkowicz-Dobrzański, Rafał; Sen(de), Aditi; Sen, Ujjwal; Lewenstein, Maciej

    2009-07-01

    Secret sharing is a protocol in which a “boss” wants to send a classical message secretly to two “subordinates,” such that none of the subordinates is able to know the message alone, while they can find it if they cooperate. Quantum mechanics is known to allow for such a possibility. We analyze tolerable quantum bit error rates in such secret sharing protocols in the physically relevant case when the eavesdropping is local with respect to the two channels of information transfer from the boss to the two subordinates. We find that using entangled encoding states is advantageous to legitimate users of the protocol. We therefore find that entanglement is useful for secure quantum communication. We also find that bound entangled states with positive partial transpose are not useful as a local eavesdropping resource. Moreover, we provide a criterion for security in secret sharing—a parallel of the Csiszár-Körner criterion in single-receiver classical cryptography.

  10. Controlled Bidirectional Quantum Secure Direct Communication

    PubMed Central

    Chou, Yao-Hsin; Lin, Yu-Ting; Zeng, Guo-Jyun; Lin, Fang-Jhu; Chen, Chi-Yuan

    2014-01-01

    We propose a novel protocol for controlled bidirectional quantum secure communication based on a nonlocal swap gate scheme. Our proposed protocol would be applied to a system in which a controller (supervisor/Charlie) controls the bidirectional communication with quantum information or secret messages between legitimate users (Alice and Bob). In this system, the legitimate users must obtain permission from the controller in order to exchange their respective quantum information or secret messages simultaneously; the controller is unable to obtain any quantum information or secret messages from the decoding process. Moreover, the presence of the controller also avoids the problem of one legitimate user receiving the quantum information or secret message before the other, and then refusing to help the other user decode the quantum information or secret message. Our proposed protocol is aimed at protecting against external and participant attacks on such a system, and the cost of transmitting quantum bits using our protocol is less than that achieved in other studies. Based on the nonlocal swap gate scheme, the legitimate users exchange their quantum information or secret messages without transmission in a public channel, thus protecting against eavesdroppers stealing the secret messages. PMID:25006596

  11. Social Security Child Protection Act of 2011

    THOMAS, 112th Congress

    Rep. Marchant, Kenny [R-TX-24

    2011-09-22

    09/28/2011 Referred for a period ending not later than September 28, 2011, (or for a later time if the Chairman so designates) to the Subcommittee on Social Security, in each case for consideration of such provisions as fall within the jurisdiction of the subcommittee concerned. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  12. Secure direct communication with a quantum one-time pad

    SciTech Connect

    Deng Fuguo; Long Guilu

    2004-05-01

    Quantum secure direct communication is the direct communication of secret messages without first producing a shared secret key. It may be used in some urgent circumstances. Here we propose a quantum secure direct communication protocol using single photons. The protocol uses batches of single photons prepared randomly in one of four different states. These single photons serve as a one-time pad which is used directly to encode the secret messages in one communication process. We also show that it is unconditionally secure. The protocol is feasible with present-day technique.

  13. New Opportunities with the Advanced Communications Technology Satellite (ACTS)

    NASA Technical Reports Server (NTRS)

    Bauer, Robert

    1998-01-01

    Various issues associated with the Advanced Communications Technology Satellite (ACTS) are presented in viewgraph form. Specific topics include: 1) ACTS program review; 2) Spot beam locations; 3) Key ACTS technologies; 4) ACTS accomplishments; 5) Experiments operations; 6) Inclined orbit opportunity, mission and impact; 7) Modifications summary; 8) Experiment opportunity, categories, processes; and 9) Recent and ongoing activity.

  14. ACTS Multibeam Communications Package - Technology for the 1990S

    NASA Technical Reports Server (NTRS)

    Graebner, John C.; Cashman, William F.

    1990-01-01

    To maintain its competitive position in the 1990s, satellite communications must evolve to provide new services and to reduce the costs of supplying existing services. NASA's Advanced Communications Technology Satellite (ACTS) program is directed toward developing the technology base that will support this evolution. The ACTS communications payload is optimized for digital communications using a time-division multiple access format. Scanning spot-beam antennas provide high-performance on-demand service to the earth communication stations. On-board processing and switching allow full connectivity in a single-hop network architecture. ACTS employs Ka-band (30/20 GHz) links for communications traffic and includes techniques for mitigating rain fades. Scheduled to be launched by a Space Shuttle in 1992, ACTS will provide in-orbit technology verification and support experimental communications networks for up to four years.

  15. A secure communications infrastructure for high-performance distributed computing

    SciTech Connect

    Foster, I.; Koenig, G.; Tuecke, S.

    1997-08-01

    Applications that use high-speed networks to connect geographically distributed supercomputers, databases, and scientific instruments may operate over open networks and access valuable resources. Hence, they can require mechanisms for ensuring integrity and confidentially of communications and for authenticating both users and resources. Security solutions developed for traditional client-server applications do not provide direct support for the program structures, programming tools, and performance requirements encountered in these applications. The authors address these requirements via a security-enhanced version of the Nexus communication library; which they use to provide secure versions of parallel libraries and languages, including the Message Passing Interface. These tools permit a fine degree of control over what, where, and when security mechanisms are applied. In particular, a single application can mix secure and nonsecure communication, allowing the programmer to make fine-grained security/performance tradeoffs. The authors present performance results that quantify the performance of their infrastructure.

  16. Secure communications in the presence of pervasive deceit

    SciTech Connect

    Simmons, G.J.

    1980-01-01

    The functions of secrecy, identification of the transmitter and of authentication of messages, and combinations of these, are in principle all achievable with either symmetric or asymmetric cryptosystems. Since secure communications depend on authenticated data exchanges between and/or authenticated actions by some of the parties to the communication, the fundamentals of authentication using symmetric or asymmetric techniques are developed. The surprising conclusion is that they differ only in the secure exchanges required to achieve further secure communications. The problem of authenticating a public-key directory is discussed in the light of these findings.

  17. Fiber transmission of antisqueezed light for secure communications

    NASA Astrophysics Data System (ADS)

    Tomaru, Tatsuya; Sasaki, Shinya

    2009-03-01

    Secure communications are a prospective application of the technologies originating from quantum information physics. Antisqueezed light, which is not necessarily in a quantum state, is a candidate for secure optical communications because it is tolerant to loss and amplification. We transmitted antisqueezed light, generated with a reflection-type fiber interferometer, through 100 km dispersion-shifted fibers including two erbium-doped fiber amplifiers for the first time. The coding was pseudo-randomized phase-shift keying, and the combination of the pseudo-randomization and antisqueezed fluctuations increased the bit-error rate of eavesdroppers, suggesting that our system is a technological candidate for future secure optical communications.

  18. The Indian National Food Security Act, 2013: a commentary.

    PubMed

    Varadharajan, Kiruba Sankar; Thomas, Tinku; Kurpad, Anura

    2014-06-01

    The National Food Security Act (NFSA) 2013, passed recently by the Indian Parliament, aims to ensure food security in India, chiefly by providing cereals at subsidized prices through the Targeted Public Distribution System (TPDS) for about two-thirds of households. The predominant line of criticism of the NFSA has been the costs of such an ambitious rights-based approach in the context of decelerating economic growth and growing fiscal deficits. We argue that the food subsidy has been increasing through the last few decades and is set to climb even higher with this act but that the incremental costs, at about 0.2% of gross domestic product, are not as high as claimed. Further, recent evidence of increasing utilization of the TPDS and decreasing corruption add credence to the act's premise that significant income transfers to poor households can be achieved, thereby promoting food security as well as dietary diversity. Several concerns remain to be addressed in the design and implementation of the act, including its proposed coverage, a cereal-centric approach, the identification of beneficiaries, and its adaptability at the state level. If these are resolved effectively, the act can prove to be a significant step forward in India's long-drawn-out battle against undernutrition and food insecurity. Finally, the NFSA also provides a fresh opportunity to reform and strengthen the TPDS, which has been an integral component of India's strategy to achieve food security at the national level. PMID:25076773

  19. Speech acts, communication problems, and fighter pilot team performance.

    PubMed

    Svensson, Jonathan; Andersson, Jan

    Two aspects of team communication, speech acts and communication problems, and their relation to team performance in a team air combat simulator were studied. The purpose was to enhance the understanding of how team performance is related to team communication. Ten Swedish fighter pilots and four fighter controllers of varying experience participated. Data were collected during fighter simulator training involving four pilots and one fighter controller in each of two teams. Speech acts were collapsed over seven categories and communication problems over five categories. Communication was studied from two perspectives: critical situation outcome and mission outcome. Some problems were closely related to particular speech acts. Speech act frequency, especially meta-communications and tactics, was highest when winning. However, the timing of tactics in critical situations needs further research. Communication problem frequency was highest for runs which ended equally. The most common problem was simultaneous speech, possibly because of the simulator radio system. The number of speech acts was related to enhanced performance but in a complex manner. Thus in order to work efficiently team members need to communicate, but to communicate sufficiently and at appropriate times. This work has applications for fighter pilot and controller team training and the development of communication standards. PMID:17008254

  20. Online Communications and Geolocation Protection Act

    THOMAS, 113th Congress

    Rep. Lofgren, Zoe [D-CA-19

    2013-03-06

    04/08/2013 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, And Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  1. A primer: Social Security Act programs to assist the disabled.

    PubMed

    This summary is designed for those who are unfamiliar with the many current features of federally sponsored disability and health programs under the Social Security Act, including the Social Security Disability Insurance (DI) program, the Supplemental Security Income (SSI) program, Medicare, and Medicaid. It provides an overview of the provisions and operations of the programs. Several SSA resources were consulted in compiling the material: Social Security Handbook (available at http://www.socialsecurity.gov/ OP_Home/handbook/handbook.html); Annual Statistical Supplement to the Social Security Bulletin, 2005 (available at http://www.socialsecurity.gov/policy/docs/statcomps/supplement/2005); Trends in the Social Security and Supplemental Security Income Disability Programs, by John Kearney and L. Scott Muller (available at http://www.socialsecurity.gov/policy/docs/chartbooks/disability trends); and Disability program sections of the Social Security Online Web pages (available at http://www.socialsecurity.gov/disability). This summary is intended to assist in understanding the features of these federal disability and health programs. The descriptions are intended for explanatory purposes and do not provide guidance in administrative or claimant actions. PMID:17252743

  2. 77 FR 72814 - Information Collection; Secure Rural Schools Act

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-06

    ... Forest Service Information Collection; Secure Rural Schools Act AGENCY: Forest Service, USDA. ACTION... announces the intention of the Forest Service to seek approval to renew and revise a currently approved... Forest Service is seeking comments from all interested individuals and organizations on renewal...

  3. 17 CFR 239.31 - Form F-1, registration statement under the Securities Act of 1933 for securities of certain...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... affecting Form F-1, see the List of CFR Sections Affected, which appears in the Finding Aids section of the... statement under the Securities Act of 1933 for securities of certain foreign private issuers. 239.31 Section... under the Securities Act of 1933 for securities of certain foreign private issuers. (a) Form F-1...

  4. 17 CFR 239.31 - Form F-1, registration statement under the Securities Act of 1933 for securities of certain...

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... affecting Form F-1, see the List of CFR Sections Affected, which appears in the Finding Aids section of the... statement under the Securities Act of 1933 for securities of certain foreign private issuers. 239.31 Section... under the Securities Act of 1933 for securities of certain foreign private issuers. (a) Form F-1...

  5. 17 CFR 239.31 - Form F-1, registration statement under the Securities Act of 1933 for securities of certain...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... F-1, see the List of CFR Sections Affected, which appears in the Finding Aids section of the printed... statement under the Securities Act of 1933 for securities of certain foreign private issuers. 239.31 Section... under the Securities Act of 1933 for securities of certain foreign private issuers. (a) Form F-1...

  6. 17 CFR 239.31 - Form F-1, registration statement under the Securities Act of 1933 for securities of certain...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... F-1, see the List of CFR Sections Affected, which appears in the Finding Aids section of the printed... statement under the Securities Act of 1933 for securities of certain foreign private issuers. 239.31 Section... under the Securities Act of 1933 for securities of certain foreign private issuers. (a) Form F-1...

  7. Public Law 96-294: Energy Security Act. [Annotated text

    SciTech Connect

    Not Available

    1980-01-01

    An annotated text of the Energy Security Act (P.L. 96-294) is presented. The Act is intended to reduce US dependence on imported energy and protect against both economic and energy-supply disruptions by developing commercial-scale synthetic and alternative fuels. Major divisions of the Act are: Title I - Synthetic Fuel; Title II - Biomass Energy Alcohol Fuels; Title III - Energy Targets; Title IV - Renewable Energy Initiatives; Title V - Solar Energy and Energy Conservation; Title VI - Geothermal Energy; and title VII - Acid Precipitation Program and Carbon Dioxide Study. (DCK)

  8. Hyperchaotic Encryption for Secure E-Mail Communication

    NASA Astrophysics Data System (ADS)

    Aguilar-Bustos, A. Y.; Cruz-Hernández, C.; López-Gutiérrez, R. M.; Tlelo-Cuautle, E.; Posadas-Castillo, C.

    In this chapter, secure computer communication based on synchronized hyperchaotic maps is presented. In particular, we appeal to model-matching approach from nonlinear control theory to synchronize the outputs of two coupled hyperchaotic Rössler maps. An application to secure e-mail communication for confidential information is given. By using a hyperchaotic encryption scheme, we show that output synchronization of hyperchaotic Rössler maps is indeed suitable for encryption, transmission, and decryption of information.

  9. Comment on: Supervisory Asymmetric Deterministic Secure Quantum Communication

    NASA Astrophysics Data System (ADS)

    Kao, Shih-Hung; Tsai, Chia-Wei; Hwang, Tzonelih

    2012-12-01

    In 2010, Xiu et al. (Optics Communications 284:2065-2069, 2011) proposed several applications based on a new secure four-site distribution scheme using χ-type entangled states. This paper points out that one of these applications, namely, supervisory asymmetric deterministic secure quantum communication, is subject to an information leakage problem, in which the receiver can extract two bits of a three-bit secret message without the supervisor's permission. An enhanced protocol is proposed to resolve this problem.

  10. Sensor based framework for secure multimedia communication in VANET.

    PubMed

    Rahim, Aneel; Khan, Zeeshan Shafi; Bin Muhaya, Fahad T; Sher, Muhammad; Kim, Tai-Hoon

    2010-01-01

    Secure multimedia communication enhances the safety of passengers by providing visual pictures of accidents and danger situations. In this paper we proposed a framework for secure multimedia communication in Vehicular Ad-Hoc Networks (VANETs). Our proposed framework is mainly divided into four components: redundant information, priority assignment, malicious data verification and malicious node verification. The proposed scheme jhas been validated with the help of the NS-2 network simulator and the Evalvid tool. PMID:22163462

  11. Sensor Based Framework for Secure Multimedia Communication in VANET

    PubMed Central

    Rahim, Aneel; Khan, Zeeshan Shafi; Bin Muhaya, Fahad T.; Sher, Muhammad; Kim, Tai-Hoon

    2010-01-01

    Secure multimedia communication enhances the safety of passengers by providing visual pictures of accidents and danger situations. In this paper we proposed a framework for secure multimedia communication in Vehicular Ad-Hoc Networks (VANETs). Our proposed framework is mainly divided into four components: redundant information, priority assignment, malicious data verification and malicious node verification. The proposed scheme jhas been validated with the help of the NS-2 network simulator and the Evalvid tool. PMID:22163462

  12. The Advanced Communications Technology Satellite (ACTS) capabilities for serving science

    NASA Technical Reports Server (NTRS)

    Meyer, Thomas R.

    1990-01-01

    Results of research on potential science applications of the NASA Advanced Communications Technology Satellite (ACTS) are presented. Discussed here are: (1) general research on communications related issues; (2) a survey of science-related activities and programs in the local area; (3) interviews of selected scientists and associated telecommunications support personnel whose projects have communications requirements; (4) analysis of linkages between ACTS functionality and science user communications activities and modes of operation; and (5) an analysis of survey results and the projection of conclusions to a national scale.

  13. 49 CFR 236.1033 - Communications and security requirements.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ..., INSPECTION, MAINTENANCE, AND REPAIR OF SIGNAL AND TRAIN CONTROL SYSTEMS, DEVICES, AND APPLIANCES Positive Train Control Systems § 236.1033 Communications and security requirements. (a) All wireless... exceeding the security strength required to protect the data as defined in the railroad's PTCSP and...

  14. 49 CFR 236.1033 - Communications and security requirements.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ..., INSPECTION, MAINTENANCE, AND REPAIR OF SIGNAL AND TRAIN CONTROL SYSTEMS, DEVICES, AND APPLIANCES Positive Train Control Systems § 236.1033 Communications and security requirements. (a) All wireless... exceeding the security strength required to protect the data as defined in the railroad's PTCSP and...

  15. 49 CFR 236.1033 - Communications and security requirements.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ..., INSPECTION, MAINTENANCE, AND REPAIR OF SIGNAL AND TRAIN CONTROL SYSTEMS, DEVICES, AND APPLIANCES Positive Train Control Systems § 236.1033 Communications and security requirements. (a) All wireless... exceeding the security strength required to protect the data as defined in the railroad's PTCSP and...

  16. 49 CFR 236.1033 - Communications and security requirements.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ..., INSPECTION, MAINTENANCE, AND REPAIR OF SIGNAL AND TRAIN CONTROL SYSTEMS, DEVICES, AND APPLIANCES Positive Train Control Systems § 236.1033 Communications and security requirements. (a) All wireless... exceeding the security strength required to protect the data as defined in the railroad's PTCSP and...

  17. Novel technology for enhanced security and trust in communication networks

    NASA Astrophysics Data System (ADS)

    Milovanov, Alexander; Bukshpun, Leonid; Pradhan, Ranjit; Jannson, Tomasz

    2011-06-01

    A novel technology that significantly enhances security and trust in wireless and wired communication networks has been developed. It is based on integration of a novel encryption mechanism and novel data packet structure with enhanced security tools. This novel data packet structure results in an unprecedented level of security and trust, while at the same time reducing power consumption and computing/communication overhead in networks. As a result, networks are provided with protection against intrusion, exploitation, and cyber attacks and posses self-building, self-awareness, self-configuring, self-healing, and self-protecting intelligence.

  18. A Secure Communication Suite for Underwater Acoustic Sensor Networks

    PubMed Central

    Dini, Gianluca; Duca, Angelica Lo

    2012-01-01

    In this paper we describe a security suite for Underwater Acoustic Sensor Networks comprising both fixed and mobile nodes. The security suite is composed of a secure routing protocol and a set of cryptographic primitives aimed at protecting the confidentiality and the integrity of underwater communication while taking into account the unique characteristics and constraints of the acoustic channel. By means of experiments and simulations based on real data, we show that the suite is suitable for an underwater networking environment as it introduces limited, and sometimes negligible, communication and power consumption overhead. PMID:23202204

  19. Advanced Communication Technology Satellite (ACTS) multibeam antenna technology verification experiments

    NASA Technical Reports Server (NTRS)

    Acosta, Roberto J.; Larko, Jeffrey M.; Lagin, Alan R.

    1992-01-01

    The Advanced Communication Technology Satellite (ACTS) is a key to reaching NASA's goal of developing high-risk, advanced communications technology using multiple frequency bands to support the nation's future communication needs. Using the multiple, dynamic hopping spot beams, and advanced on board switching and processing systems, ACTS will open a new era in communications satellite technology. One of the key technologies to be validated as part of the ACTS program is the multibeam antenna with rapidly reconfigurable hopping and fixed spot beam to serve users equipped with small-aperature terminals within the coverage areas. The proposed antenna technology experiments are designed to evaluate in-orbit ACTS multibeam antenna performance (radiation pattern, gain, cross pol levels, etc.).

  20. Secure satellite communication using multi-photon tolerant quantum communication protocol

    NASA Astrophysics Data System (ADS)

    Darunkar, Bhagyashri; Punekar, Nikhil; Verma, Pramode K.

    2015-09-01

    This paper proposes and analyzes the potential of a multi-photon tolerant quantum communication protocol to secure satellite communication. For securing satellite communication, quantum cryptography is the only known unconditionally secure method. A number of recent experiments have shown feasibility of satellite-aided global quantum key distribution (QKD) using different methods such as: Use of entangled photon pairs, decoy state methods, and entanglement swapping. The use of single photon in these methods restricts the distance and speed over which quantum cryptography can be applied. Contemporary quantum cryptography protocols like the BB84 and its variants suffer from the limitation of reaching the distances of only Low Earth Orbit (LEO) at the data rates of few kilobits per second. This makes it impossible to develop a general satellite-based secure global communication network using the existing protocols. The method proposed in this paper allows secure communication at the heights of the Medium Earth Orbit (MEO) and Geosynchronous Earth Orbit (GEO) satellites. The benefits of the proposed method are two-fold: First it enables the realization of a secure global communication network based on satellites and second it provides unconditional security for satellite networks at GEO heights. The multi-photon approach discussed in this paper ameliorates the distance and speed issues associated with quantum cryptography through the use of contemporary laser communication (lasercom) devices. This approach can be seen as a step ahead towards global quantum communication.

  1. Three-step semiquantum secure direct communication protocol

    NASA Astrophysics Data System (ADS)

    Zou, XiangFu; Qiu, DaoWen

    2014-09-01

    Quantum secure direct communication is the direct communication of secret messages without need for establishing a shared secret key first. In the existing schemes, quantum secure direct communication is possible only when both parties are quantum. In this paper, we construct a three-step semiquantum secure direct communication (SQSDC) protocol based on single photon sources in which the sender Alice is classical. In a semiquantum protocol, a person is termed classical if he (she) can measure, prepare and send quantum states only with the fixed orthogonal quantum basis {|0>, |1>}. The security of the proposed SQSDC protocol is guaranteed by the complete robustness of semiquantum key distribution protocols and the unconditional security of classical one-time pad encryption. Therefore, the proposed SQSDC protocol is also completely robust. Complete robustness indicates that nonzero information acquired by an eavesdropper Eve on the secret message implies the nonzero probability that the legitimate participants can find errors on the bits tested by this protocol. In the proposed protocol, we suggest a method to check Eves disturbing in the doves returning phase such that Alice does not need to announce publicly any position or their coded bits value after the photons transmission is completed. Moreover, the proposed SQSDC protocol can be implemented with the existing techniques. Compared with many quantum secure direct communication protocols, the proposed SQSDC protocol has two merits: firstly the sender only needs classical capabilities; secondly to check Eves disturbing after the transmission of quantum states, no additional classical information is needed.

  2. Advanced Communications Technology Satellite (ACTS): Four-Year System Performance

    NASA Technical Reports Server (NTRS)

    Acosta, Roberto J.; Bauer, Robert; Krawczyk, Richard J.; Reinhart, Richard C.; Zernic, Michael J.; Gargione, Frank

    1999-01-01

    The Advanced Communications Technology Satellite (ACTS) was conceived at the National Aeronautics and Space Administration (NASA) in the late 1970's as a follow-on program to ATS and CTS to continue NASA's long history of satellite communications projects. The ACTS project set the stage for the C-band satellites that started the industry, and later the ACTS project established the use of Ku-band for video distribution and direct-to-home broadcasting. ACTS, launched in September 1993 from the space shuttle, created a revolution in satellite system architecture by using digital communications techniques employing key technologies such as a fast hopping multibeam antenna, an on-board baseband processor, a wide-band microwave switch matrix, adaptive rain fade compensation, and the use of 900 MHz transponders operating at Ka-band frequencies. This paper describes the lessons learned in each of the key ACTS technology areas, as well as in the propagation investigations.

  3. Secure Many-to-One Communications in Wireless Sensor Networks

    PubMed Central

    Viejo, Alexandre; Domingo-Ferrer, Josep; Sebé, Francesc; Castellà-Roca, Jordi

    2009-01-01

    Wireless Sensor Networks (WSN) are formed by nodes with limited computational and power resources. WSNs are finding an increasing number of applications, both civilian and military, most of which require security for the sensed data being collected by the base station from remote sensor nodes. In addition, when many sensor nodes transmit to the base station, the implosion problem arises. Providing security measures and implosion-resistance in a resource-limited environment is a real challenge. This article reviews the aggregation strategies proposed in the literature to handle the bandwidth and security problems related to many-to-one transmission in WSNs. Recent contributions to secure lossless many-to-one communication developed by the authors in the context of several Spanish-funded projects are surveyed. Ongoing work on the secure lossy many-to-one communication is also sketched. PMID:22346700

  4. A protocol for secure communication in large distributed systems

    NASA Astrophysics Data System (ADS)

    Anderson, D. P.; Ferrari, D.; Rangan, P. V.; Sartirana, B.

    1987-01-01

    A mechanism for secure communication in large distributed systems is proposed. The mechanism, called Authenticated Datagram Protocol (ADP), provides message authentication and, optionally, privacy of data. ADP is a host-to-host datagram protocol, positioned below the transport layer; it uses public-key encryption to establish secure channels between hosts and to authenticate owners, and single-key encryption for communication over a channel and to ensure privacy of the messages. ADP is shown to satisfy the main security requirements of large distributed systems, to provide end-to-end security in spite of its relatively low level, and to exhibit several advantages over schemes in which security mechanisms are at a higher level. The results of a trace-driven measurement study of ADP performance show that its throughput and latency are acceptable even within the limitations of today's technology, provided single-key encryption/decryption can be done in hardware.

  5. Quantum Secure Direct Communication Based on Chaos with Authentication

    NASA Astrophysics Data System (ADS)

    Huang, Dazu; Chen, Zhigang; Guo, Ying; Lee, Moon Ho

    2007-12-01

    A quantum secure direct communication protocol based on chaos is proposed with authentication. It has an advantage over distributing the secret message directly and verifying the communicators’ identities with the assistance of a trusted center. To ensure the security of the secret message and the process of verification, the initial order of the travel particles is disturbed according to a chaotic sequence generated secretly via the general Arnold map. Security analysis demonstrates that the present scheme is secure against several attack strategies, such as the man-in-the-middle attack and Trojan horse attack.

  6. Communications--Getting the Act Together.

    ERIC Educational Resources Information Center

    Canadian Communications Research Information Centre, Ottawa (Ontario).

    This document provides a discussion of the policy implications of a proposed bill introduced in the Canadian House of Commons in Spring 1977 relating to the regulation of telecommunications in Canada. This act, which can be viewed as an attempt to make telecommunications more responsive to changing technology and to provincial concerns, seeks to…

  7. A Multiparty Controlled Bidirectional Quantum Secure Direct Communication and Authentication Protocol Based on EPR Pairs

    NASA Astrophysics Data System (ADS)

    Chang, Yan; Zhang, Shi-Bin; Yan, Li-Li; Sheng, Zhi-Wei

    2013-06-01

    A multiparty controlled bidirectional quantum secure direct communication and authentication protocol is proposed based on EPR pair and entanglement swapping. The legitimate identities of communicating parties are encoded to Bell states which act as a detection sequence. Secret messages are transmitted by using the classical XOR operation, which serves as a one-time-pad. No photon with secret information transmits in the quantum channel. Compared with the protocols proposed by Wang et al. [Acta Phys. Sin. 56 (2007) 673; Opt. Commun. 266 (2006) 732], the protocol in this study implements bidirectional communication and authentication, which defends most attacks including the ‘man-in-the-middle’ attack efficiently.

  8. Review of the 2015 Drug Supply Chain Security Act.

    PubMed

    Brechtelsbauer, Erich D; Pennell, Benjamin; Durham, Mary; Hertig, John B; Weber, Robert J

    2016-06-01

    The integrity of the pharmaceutical supply chain is threatened by medication counterfeiting, importation of unapproved and substandard drugs, and grey markets - all of which have the potential to distribute drug products with the potential for serious harm. On November 27, 2013, President Obama signed into law Title II of the Drug Quality and Security Act, now known as the Drug Supply Chain Security Act (DSCSA). Over the next 10 years, the DSCSA will require the pharmaceutical supply chain to implement medication tracking and tracing; serialization, verification, and detection of suspicious products; and strict guidelines for wholesaler licensing and reporting. This article reviews the important aspects of the DSCSA and outlines the role of health-system pharmacy leaders in ensuring compliance to the DSCSA. By verifying that medication supplies are free from adulteration and tampering, the DSCSA serves as a foundational law to ensure quality in providing patient-centered pharmacy services. PMID:27354753

  9. Quantum Communication for the Ultimate Capacity and Security

    NASA Astrophysics Data System (ADS)

    Sasaki, Masahide; Fujiwara, Mikio; Takeoka, Masahiro

    Quantum info-communication technologies (Q-ICT) will be able to realize quantum communication which attains higher capacity than that of conventional optical communications, and the unconditionally secure communication, known as quantum key distribution (QKD), that cannot be broken by any future technologies. In this article we first review a brief history of Q-ICT, and introduce basic notions and results so far. We then present our recent results on these two technologies, addressing current limitations of the known schemes, and finally discuss future perspectives, especially a challenge to merge the merits of the two.

  10. Personal communications via ACTS satellite HBR transponders

    NASA Technical Reports Server (NTRS)

    Fang, Russell J. F.

    1991-01-01

    The concept of a fully meshed network of briefcase-sized terminals is presented for personal communications over Ka-band satellite transponders. In this concept, undesirable double-hop delays are avoided for voice communications. The bandwidth and power resources of the transponder are efficiently shared by users in a simple demand-assigned manner via code-division multiple access (CDMA). Voice, data, and facsimile are statistically multiplexed at each terminal. In order to minimize terminal costs, frequency-precorrected, and level-preadjusted continuous-wave tones are sent from the central network control station in each beam so that the terminals in each down-link beam can use these pilots as references for antenna acquisition and tracking, as reliable frequency sources, and as indicators of signal fade for up-link power control (ULPC). The potential CDMA 'near-far' problem due to up-link fades is mitigated by using ULPC. Quasi-burst mode transmission is employed to minimize the potential clock and pseudorandom number code synchronization.

  11. Quantum authencryption: one-step authenticated quantum secure direct communications for off-line communicants

    NASA Astrophysics Data System (ADS)

    Hwang, Tzonelih; Luo, Yi-Ping; Yang, Chun-Wei; Lin, Tzu-Han

    2014-04-01

    This work proposes a new direction in quantum cryptography called quantum authencryption. Quantum authencryption (QA), a new term to distinguish from authenticated quantum secure direct communications, is used to describe the technique of combining quantum encryption and quantum authentication into one process for off-line communicants. QA provides a new way of quantum communications without the presence of a receiver on line, and thus makes many applications depending on secure one-way quantum communications, such as quantum E-mail systems, possible. An example protocol using single photons and one-way hash functions is presented to realize the requirements on QA.

  12. 75 FR 18860 - Privacy Act of 1974, Department of Homeland Security Transportation Security Administration-013...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-13

    ... Officer Record System (FDORS), previously published on August 18, 2003 (68 FR 49496). TSA's mission is to... reflected in the final rule published on June 25, 2004, 69 FR 35536. Consistent with the Privacy Act... Security Administration--013 Federal Flight Deck Officer Record System AGENCY: Privacy Office, DHS....

  13. The Health Insurance Portability and Accountability Act: security and privacy requirements.

    PubMed

    Tribble, D A

    2001-05-01

    The security and privacy requirements of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) and their implications for pharmacy are discussed. HIPAA was enacted to improve the portability of health care insurance for persons leaving jobs. A section of the act encourages the use of electronic communications for health care claims adjudication, mandates the use of new standard code sets and transaction sets, and establishes the need for regulations to protect the security and privacy of individually identifiable health care information. Creating these regulations became the task of the Department of Health and Human Services. Regulations on security have been published for comment. Regulations on privacy and the definition of standard transaction sets and code sets are complete. National identifiers for patients, providers, and payers have not yet been established. The HIPAA regulations on security and privacy will require that pharmacies adopt policies and procedures that limit access to health care information. Existing pharmacy information systems may require upgrading or replacement. Costs of implementation nationwide are estimated to exceed $8 billion. The health care community has two years from the finalization of each regulation to comply with that regulation. The security and privacy requirements of HIPAA will require pharmacies to review their practices regarding the storage, use, and disclosure of protected health care information. PMID:11351916

  14. Controlled Secure Direct Communication with Six-Qubit Entangled States

    NASA Astrophysics Data System (ADS)

    Li, Yuan-hua; Li, Xiao-lan; Nie, Li-ping; Sang, Ming-huang

    2016-02-01

    We propose an experimentally feasible scheme for implementing controlled quantum secure direct communication by using six-qubit entangled states. According to the results measured by the sender and the controller, the receiver can obtain different secret messages in a deterministic way with unit successful probability. In our scheme, the information-carrying qubits do not need to be transmitted over the public channel. Therefore, the scheme is determinate and secure.

  15. 75 FR 8088 - Privacy Act of 1974; Department of Homeland Security/ALL-023 Personnel Security Management System...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-23

    ... Management System of Records (74 FR 3084, January 16, 2009) for the collection and maintenance of records... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security/ALL--023 Personnel... to update and reissue Department of Homeland Security/ALL--023 Personnel Security Management...

  16. 75 FR 5166 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-01

    ... From the Federal Register Online via the Government Publishing Office SOCIAL SECURITY ADMINISTRATION Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration/Railroad Retirement Board (SSA/RRB))-- Match Number 1308 AGENCY: Social Security Administration...

  17. Secure steganographic communication algorithm based on self-organizing patterns

    NASA Astrophysics Data System (ADS)

    Saunoriene, Loreta; Ragulskis, Minvydas

    2011-11-01

    A secure steganographic communication algorithm based on patterns evolving in a Beddington-de Angelis-type predator-prey model with self- and cross-diffusion is proposed in this paper. Small perturbations of initial states of the system around the state of equilibrium result in the evolution of self-organizing patterns. Small differences between initial perturbations result in slight differences also in the evolving patterns. It is shown that the generation of interpretable target patterns cannot be considered as a secure mean of communication because contours of the secret image can be retrieved from the cover image using statistical techniques if only it represents small perturbations of the initial states of the system. An alternative approach when the cover image represents the self-organizing pattern that has evolved from initial states perturbed using the dot-skeleton representation of the secret image can be considered as a safe visual communication technique protecting both the secret image and communicating parties.

  18. Secure satellite communications in the ISDN

    NASA Astrophysics Data System (ADS)

    de Cristofaro, R.; Bratcher, B. A.

    The single channel per carrier (SCPC) earth station equipment using continuously variable slope delta modulation voice encoding and phase shift keying carrier modulation is examined. The satellite earth station for SCPC consists of: antenna, high power amplifier, low noise amplifier, RF up-converter and down-converter, and the SCPC common equipment and channel unit. The functions and operations of the common equipment and channel unit of the SCPC are described. The data transmission security is achieved using full duplex digital encryption; the crypto synchronizing sequence format is discussed.

  19. Chaos-based secure communications in a large community

    NASA Astrophysics Data System (ADS)

    Wang, Shihong; Kuang, Jinyu; Li, Jinghua; Luo, Yunlun; Lu, Huaping; Hu, Gang

    2002-12-01

    One-way coupled map lattices are used for cryptography in secure communication, based on spatiotemporal chaos synchronization. The sensitivity of synchronization between the encryption and decryption systems can be adjusted by varying the system size. With a suitable parameter combination, the cryptosystem can reach optimal trade-off of security and performance, i.e., it shows high security (resistant against the public-structure and known-plaintext attacks) together with fast encryption (and decryption) speed. An experiment of duplex voice transmission through university network is realized, which confirms the above advantages of our approach.

  20. Chaos-based secure communications in a large community.

    PubMed

    Wang, Shihong; Kuang, Jinyu; Li, Jinghua; Luo, Yunlun; Lu, Huaping; Hu, Gang

    2002-12-01

    One-way coupled map lattices are used for cryptography in secure communication, based on spatiotemporal chaos synchronization. The sensitivity of synchronization between the encryption and decryption systems can be adjusted by varying the system size. With a suitable parameter combination, the cryptosystem can reach optimal trade-off of security and performance, i.e., it shows high security (resistant against the public-structure and known-plaintext attacks) together with fast encryption (and decryption) speed. An experiment of duplex voice transmission through university network is realized, which confirms the above advantages of our approach. PMID:12513338

  1. 75 FR 22656 - Order Extending Temporary Conditional Exemptions Under the Securities Exchange Act of 1934 in...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-29

    ... interest.\\3\\ \\1\\ See generally Securities Exchange Act Release No. 60372 (Jul. 23, 2009), 74 FR 37748 (Jul... ICE Clear Europe order''); Securities Exchange Act Release No. 60373 (Jul. 23, 2009), 74 FR 37740 (Jul...), 74 FR 11781 (Mar. 19, 2009), Securities Exchange Act Release No. 61164 (Dec. 14, 2009), 74 FR...

  2. Chaos Based Secure IP Communications over Satellite DVB

    NASA Astrophysics Data System (ADS)

    Caragata, Daniel; El Assad, Safwan; Tutanescu, Ion; Sofron, Emil

    2010-06-01

    The Digital Video Broadcasting—Satellite (DVB-S) standard was originally conceived for TV and radio broadcasting. Later, it became possible to send IP packets using encapsulation methods such as Multi Protocol Encapsulation, MPE, or Unidirectional Lightweight Encapsulation, ULE. This paper proposes a chaos based security system for IP communications over DVB-S with ULE encapsulation. The proposed security system satisfies all the security requirements while respecting the characteristics of satellite links, such as the importance of efficient bandwidth utilization and high latency time. It uses chaotic functions to generate the keys and to encrypt the data. The key management is realized using a multi-layer architecture. A theoretical analysis of the system and a simulation of FTP and HTTP traffic are presented and discussed to show the cost of the security enhancement and to provide the necessary tools for security parameters setup.

  3. Bidirectional Quantum Secure Direct Communication in Trapped Ion Systems

    NASA Astrophysics Data System (ADS)

    Cui, Yeqin; Gao, Jianguo

    2016-03-01

    We propose a feasible scheme for implementing quantum secure direct communication in trapped ion systems. According to the results measured by the sender, the receiver can obtain different secret messages in a deterministic way. Our scheme is insensitive to both the initial vibrational state and heating. The probability of the success in our scheme is 1.0.

  4. A method to ensure energy security of satellite communication systems

    NASA Astrophysics Data System (ADS)

    Chipiga, A. F.; Senokosova, A. V.

    2009-10-01

    A method is substantiated to ensure energy security for the satellite communication systems (SCS) at a close position of the radio interception receiver. This is done by lowering the carrier frequency down to f 0 = 60…80 MHz and by applying spaced measurements with n ≥ 4 receiving antennas.

  5. Transitioning from analog to digital communications: An information security perspective

    NASA Technical Reports Server (NTRS)

    Dean, Richard A.

    1990-01-01

    A summary is given of the government's perspective on evolving digital communications as they affect secure voice users and approaches for operating during a transition period to an all digital world. An integrated architecture and a mobile satellite interface are discussed.

  6. Secure and Authenticated Data Communication in Wireless Sensor Networks

    PubMed Central

    Alfandi, Omar; Bochem, Arne; Kellner, Ansgar; Göge, Christian; Hogrefe, Dieter

    2015-01-01

    Securing communications in wireless sensor networks is increasingly important as the diversity of applications increases. However, even today, it is equally important for the measures employed to be energy efficient. For this reason, this publication analyzes the suitability of various cryptographic primitives for use in WSNs according to various criteria and, finally, describes a modular, PKI-based framework for confidential, authenticated, secure communications in which most suitable primitives can be employed. Due to the limited capabilities of common WSN motes, criteria for the selection of primitives are security, power efficiency and memory requirements. The implementation of the framework and the singular components have been tested and benchmarked in our testbed of IRISmotes. PMID:26266413

  7. Secure SCADA communication by using a modified key management scheme.

    PubMed

    Rezai, Abdalhossein; Keshavarzi, Parviz; Moravej, Zahra

    2013-07-01

    This paper presents and evaluates a new cryptographic key management scheme which increases the efficiency and security of the Supervisory Control And Data Acquisition (SCADA) communication. In the proposed key management scheme, two key update phases are used: session key update and master key update. In the session key update phase, session keys are generated in the master station. In the master key update phase, the Elliptic Curve Diffie-Hellman (ECDH) protocol is used. The Poisson process is also used to model the Security Index (SI) and Quality of Service (QoS). Our analysis shows that the proposed key management not only supports the required speed in the MODBUS implementation but also has several advantages compared to other key management schemes for secure communication in SCADA networks. PMID:23528753

  8. Secure and Authenticated Data Communication in Wireless Sensor Networks.

    PubMed

    Alfandi, Omar; Bochem, Arne; Kellner, Ansgar; Göge, Christian; Hogrefe, Dieter

    2015-01-01

    Securing communications in wireless sensor networks is increasingly important as the diversity of applications increases. However, even today, it is equally important for the measures employed to be energy efficient. For this reason, this publication analyzes the suitability of various cryptographic primitives for use in WSNs according to various criteria and, finally, describes a modular, PKI-based framework for confidential, authenticated, secure communications in which most suitable primitives can be employed. Due to the limited capabilities of common WSN motes, criteria for the selection of primitives are security, power efficiency and memory requirements. The implementation of the framework and the singular components have been tested and benchmarked in our testbed of IRISmotes. PMID:26266413

  9. Quantum secure direct communication based on supervised teleportation

    NASA Astrophysics Data System (ADS)

    Li, Yue; Liu, Yu

    2008-03-01

    We present a quantum secure direct communication(QSDC) scheme as an extension for a proposed supervised secure entanglement sharing protocol. Starting with a quick review on the supervised entanglement sharing protocol - the "Wuhan" protocol [Y. Li, et al., quant-ph/0709.1449 (2007)], we primarily focus on its further extend using for a QSDC task, in which the communication attendant Alice encodes the secret message directly onto a sequence of 2-level particles which then can be faithfully teleported to Bob using the shared maximal entanglement states obtained by the previous "Wuhan" protocol. We also evaluate the security of the QSDC scheme, where an individual self-attack performed by Alice and Bob - the out of control attack is introduced and the robustness of our scheme on the OCA is documented.

  10. Secure communication zone for white-light LED visible light communication

    NASA Astrophysics Data System (ADS)

    Chow, Chi-Wai; Liu, Yang; Yeh, Chien-Hung; Chen, Chung-Yen; Lin, Chao-Nan; Hsu, Dar-Zu

    2015-06-01

    As visible light communication (VLC) can be one of the promising wireless communication technologies in the future, improving the transmission security in VLC is highly desirable. We propose and demonstrate a secure VLC system using data superposition of different light emitting diodes (LEDs). The eavesdroppers can receive similar illumination but cannot obtain enough signal-to-noise ratio (SNR) for communication. The channel model and simulation parameters are presented. Analysis of the secure VLC zone forming using practical in-home scenarios is also discussed, showing the flexibly control the size and shift of secure VLC zone. A proof-of-concept experiment is performed, and there is a good match in trend between the experimental and simulation results.

  11. Security infrastructure requirements for electronic health cards communication.

    PubMed

    Pharow, Peter; Blobel, Bernd

    2005-01-01

    Communication and co-operation processes in the healthcare and welfare domain require a security infrastructure based on services describing status and relation of communicating principals as well as corresponding keys and attributes. Additional services provide trustworthy information on dynamic issues of communication and co-operation such as time and location of processes, workflow relations, integrity of archives and record systems, and system behaviour. To provide this communication and co-operation in a shared care environment, smart cards are widely used. Serving as storage media and portable application systems, patient data cards enable patient-controlled exchange and use of personal health data bound to specific purposes such as prescription and disease management. Additionally, patient status data such as the emergency data set or immunization may be stored in, and communicated by, patient data cards. Another deployment field of smart cards is their token functionality within a security framework, supporting basic security services such as identification, authentication, integrity, confidentiality, or accountability using cryptographic algorithms. In that context, keys, certificates, and card holder's attributes might be stored in the card as well. As an example, the German activity of introducing patient health cards and health professional cards is presented. Specification and enrolment aspects are on-going processes. PMID:16160291

  12. Security Encryption Scheme for Communication of Web Based Control Systems

    NASA Astrophysics Data System (ADS)

    Robles, Rosslin John; Kim, Tai-Hoon

    A control system is a device or set of devices to manage, command, direct or regulate the behavior of other devices or systems. The trend in most systems is that they are connected through the Internet. Traditional Supervisory Control and Data Acquisition Systems (SCADA) is connected only in a limited private network Since the internet Supervisory Control and Data Acquisition Systems (SCADA) facility has brought a lot of advantages in terms of control, data viewing and generation. Along with these advantages, are security issues regarding web SCADA, operators are pushed to connect Control Systems through the internet. Because of this, many issues regarding security surfaced. In this paper, we discuss web SCADA and the issues regarding security. As a countermeasure, a web SCADA security solution using crossed-crypto-scheme is proposed to be used in the communication of SCADA components.

  13. 17 CFR 239.500 - Form D, notice of sales of securities under Regulation D and section 4(6) of the Securities Act...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Form D, notice of sales of securities under Regulation D and section 4(6) of the Securities Act of 1933. 239.500 Section 239.500 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION FORMS PRESCRIBED UNDER THE SECURITIES ACT OF 1933 Forms Pertaining to...

  14. Secure and interoperable communication infrastructures for PPDR organisations

    NASA Astrophysics Data System (ADS)

    Müller, Wilmuth; Marques, Hugo; Pereira, Luis; Rodriguez, Jonathan; Brouwer, Frank; Bouwers, Bert; Politis, Ilias; Lykourgiotis, Asimakis; Ladas, Alexandros; Adigun, Olayinka; Jelenc, David

    2016-05-01

    The growing number of events affecting public safety and security (PS&S) on a regional scale with potential to grow up to large scale cross border disasters puts an increased pressure on agencies and organisation responsible for PS&S. In order to respond timely and in an adequate manner to such events, Public Protection and Disaster Relief (PPDR) organisations need to cooperate, align their procedures and activities, share the needed information and be interoperable. Existing PPDR/PMR technologies such as TETRA, TETRAPOL or P25, do not currently provide broadband capability nor is expected such technologies to be upgraded in the future. This presents a major limitation in supporting new services and information flows. Furthermore, there is no known standard that addresses interoperability of these technologies. In this contribution the design of a next generation communication infrastructure for PPDR organisations which fulfills the requirements of secure and seamless end-to-end communication and interoperable information exchange within the deployed communication networks is presented. Based on Enterprise Architecture of PPDR organisations, a next generation PPDR network that is backward compatible with legacy communication technologies is designed and implemented, capable of providing security, privacy, seamless mobility, QoS and reliability support for mission-critical Private Mobile Radio (PMR) voice and broadband data services. The designed solution provides a robust, reliable, and secure mobile broadband communications system for a wide variety of PMR applications and services on PPDR broadband networks, including the ability of inter-system, interagency and cross-border operations with emphasis on interoperability between users in PMR and LTE.

  15. Quantum-secure covert communication on bosonic channels

    NASA Astrophysics Data System (ADS)

    Bash, Boulat A.; Gheorghe, Andrei H.; Patel, Monika; Habif, Jonathan L.; Goeckel, Dennis; Towsley, Don; Guha, Saikat

    2015-10-01

    Computational encryption, information-theoretic secrecy and quantum cryptography offer progressively stronger security against unauthorized decoding of messages contained in communication transmissions. However, these approaches do not ensure stealth--that the mere presence of message-bearing transmissions be undetectable. We characterize the ultimate limit of how much data can be reliably and covertly communicated over the lossy thermal-noise bosonic channel (which models various practical communication channels). We show that whenever there is some channel noise that cannot in principle be controlled by an otherwise arbitrarily powerful adversary--for example, thermal noise from blackbody radiation--the number of reliably transmissible covert bits is at most proportional to the square root of the number of orthogonal modes (the time-bandwidth product) available in the transmission interval. We demonstrate this in a proof-of-principle experiment. Our result paves the way to realizing communications that are kept covert from an all-powerful quantum adversary.

  16. Quantum-secure covert communication on bosonic channels

    PubMed Central

    Bash, Boulat A.; Gheorghe, Andrei H.; Patel, Monika; Habif, Jonathan L.; Goeckel, Dennis; Towsley, Don; Guha, Saikat

    2015-01-01

    Computational encryption, information-theoretic secrecy and quantum cryptography offer progressively stronger security against unauthorized decoding of messages contained in communication transmissions. However, these approaches do not ensure stealth—that the mere presence of message-bearing transmissions be undetectable. We characterize the ultimate limit of how much data can be reliably and covertly communicated over the lossy thermal-noise bosonic channel (which models various practical communication channels). We show that whenever there is some channel noise that cannot in principle be controlled by an otherwise arbitrarily powerful adversary—for example, thermal noise from blackbody radiation—the number of reliably transmissible covert bits is at most proportional to the square root of the number of orthogonal modes (the time-bandwidth product) available in the transmission interval. We demonstrate this in a proof-of-principle experiment. Our result paves the way to realizing communications that are kept covert from an all-powerful quantum adversary. PMID:26478089

  17. Quantum-secure covert communication on bosonic channels.

    PubMed

    Bash, Boulat A; Gheorghe, Andrei H; Patel, Monika; Habif, Jonathan L; Goeckel, Dennis; Towsley, Don; Guha, Saikat

    2015-01-01

    Computational encryption, information-theoretic secrecy and quantum cryptography offer progressively stronger security against unauthorized decoding of messages contained in communication transmissions. However, these approaches do not ensure stealth--that the mere presence of message-bearing transmissions be undetectable. We characterize the ultimate limit of how much data can be reliably and covertly communicated over the lossy thermal-noise bosonic channel (which models various practical communication channels). We show that whenever there is some channel noise that cannot in principle be controlled by an otherwise arbitrarily powerful adversary--for example, thermal noise from blackbody radiation--the number of reliably transmissible covert bits is at most proportional to the square root of the number of orthogonal modes (the time-bandwidth product) available in the transmission interval. We demonstrate this in a proof-of-principle experiment. Our result paves the way to realizing communications that are kept covert from an all-powerful quantum adversary. PMID:26478089

  18. A chaos secure communication scheme based on multiplication modulation

    NASA Astrophysics Data System (ADS)

    Fallahi, Kia; Leung, Henry

    2010-02-01

    A secure spread spectrum communication scheme using multiplication modulation is proposed. The proposed system multiplies the message by chaotic signal. The scheme does not need to know the initial condition of the chaotic signals and the receiver is based on an extended Kalman filter (EKF). This signal encryption scheme lends itself to cheap implementation and can therefore be used effectively for ensuring security and privacy in commercial consumer electronics products. To illustrate the effectiveness of the proposed scheme, a numerical example based on Genesio-Tesi system and also Chen dynamical system is presented and the results are compared.

  19. The Social Security Act and Related Laws (as Amended through December 31, 1976).

    ERIC Educational Resources Information Center

    Congress of the U.S., Washington, DC. Senate Committee on Finance.

    The document is a reference to laws enacted to amend the Social Security Act and to laws which directly affect the programs under that act. Intended for use by the Senate Finance Committee, the document supplements the "Compilation of the Social Security Laws," published periodically by the Social Security Administration. The reference includes…

  20. 76 FR 72495 - Alabama Metal Coil Securement Act; Petition for Determination of Preemption

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-23

    ... TRANSPORTATION Federal Motor Carrier Safety Administration Alabama Metal Coil Securement Act; Petition for... determination that the State of Alabama's Metal Coil Securement Act is preempted by Federal law. FMCSA requests comments on what effect, if any, Alabama's metal coil load securement certification requirements may...

  1. GENERAL: Efficient quantum secure communication with a publicly known key

    NASA Astrophysics Data System (ADS)

    Li, Chun-Yan; Li, Xi-Han; Deng, Fu-Guo; Zhou, Hong-Yu

    2008-07-01

    This paper presents a simple way for an eavesdropper to eavesdrop freely the secret message in the experimental realization of quantum communication protocol proposed by Beige et al (2002 Acta Phys. Pol. A 101 357). Moreover, it introduces an efficient quantum secure communication protocol based on a publicly known key with decoy photons and two biased bases by modifying the original protocol. The total efficiency of this new protocol is double that of the original one. With a low noise quantum channel, this protocol can be used for transmitting a secret message. At present, this protocol is good for generating a private key efficiently.

  2. Secure UHF satellite communications for the 1980's

    NASA Astrophysics Data System (ADS)

    Brauer, F. M.

    It is expected that UHF satellite communications will remain the most common medium for small military platforms' secure communications links. Routine, high volume military data will in this case be handled by commercially leased satellites, and the most sensitive information, some of which will be carried by UHF, being handled by the Milstar satellite. Attention is presently given to the means by which the prospective saturation of UHF links as many more thousands of terminals come on line can be efficiently managed through better use of both channel bandwidth and time.

  3. Secure communications with low-orbit spacecraft using quantum cryptography

    DOEpatents

    Hughes, Richard J.; Buttler, William T.; Kwiat, Paul G.; Luther, Gabriel G.; Morgan, George L; Nordholt, Jane E.; Peterson, Charles G.; Simmons, Charles M.

    1999-01-01

    Apparatus and method for secure communication between an earth station and spacecraft. A laser outputs single pulses that are split into preceding bright pulses and delayed attenuated pulses, and polarized. A Pockels cell changes the polarization of the polarized delayed attenuated pulses according to a string of random numbers, a first polarization representing a "1," and a second polarization representing a "0." At the receiving station, a beamsplitter randomly directs the preceding bright pulses and the polarized delayed attenuated pulses onto longer and shorter paths, both terminating in a beamsplitter which directs the preceding bright pulses and a first portion of the polarized delayed attenuated pulses to a first detector, and a second portion of the polarized delayed attenuated pulses to a second detector to generate a key for secure communication between the earth station and the spacecraft.

  4. Security controls in the Stockpoint Logistics Integrated Communications Environment (SPLICE)

    NASA Astrophysics Data System (ADS)

    Arseneault, D. S.

    1985-03-01

    This thesis examines security controls specified and implemented in the Stock Point Logistics Integrated Communications Environment (SPLICE) project. Controls provided by the Defense Data Network and the Tandem operating system are reviewed. Alternatives from current literature in areas of authentication, encryption, and dial-port protection are reviewed for the purpose of suggesting enhancements. Issues discussed apply to most interactive/decentralized systems in operation today and include administrative as well as technical recommendations.

  5. Proportional-integral feedback demodulation for secure communications

    NASA Astrophysics Data System (ADS)

    Puebla, Hector; Alvarez-Ramirez, Jose

    2000-11-01

    A novel demodulation strategy for secure communications using chaotic signals is proposed. The approach fits within the general definition of inverse system masking (ISM) methods. In the transmitter, an information signal is encoded using modulation of a parameter in the chaotic system. In the receiver, a synchronous chaotic system is augmented with a proportional-integral (PI) feedback demodulator. The integral feedback action induces certain robustness capabilities into the demodulation loop. Simulations are presented for a class of Lur'e systems.

  6. Communicating Health Risks under Pressure: Homeland Security Applications

    SciTech Connect

    Garrahan, K.G.; Collie, S.L.

    2006-07-01

    The U.S. Environmental Protection Agency's (EPA) Office of Research and Development (ORD) Threat and Consequence Assessment Division (TCAD) within the National Homeland Security Research Center (NHSRC) has developed a tool for rapid communication of health risks and likelihood of exposure in preparation for terrorist incidents. The Emergency Consequence Assessment Tool (ECAT) is a secure web-based tool designed to make risk assessment and consequence management faster and easier for high priority terrorist threat scenarios. ECAT has been designed to function as 'defensive play-book' for health advisors, first responders, and decision-makers by presenting a series of evaluation templates for priority scenarios that can be modified for site-specific applications. Perhaps most importantly, the risk communication aspect is considered prior to an actual release event, so that management or legal advisors can concur on general risk communication content in preparation for press releases that can be anticipated in case of an actual emergency. ECAT serves as a one-stop source of information for retrieving toxicological properties for agents of concern, estimating exposure to these agents, characterizing health risks, and determining what actions need to be undertaken to mitigate the risks. ECAT has the capability to be used at a command post where inputs can be checked and communicated while the response continues in real time. This front-end planning is intended to fill the gap most commonly identified during tabletop exercises: a need for concise, timely, and informative risk communication to all parties. Training and customization of existing chemical and biological release scenarios with modeling of exposure to air and water, along with custom risk communication 'messages' intended for public, press, shareholders, and other partners enable more effective communication during times of crisis. For DOE, the ECAT could serve as a prototype that would be amenable to

  7. 75 FR 22641 - Order Extending and Modifying Temporary Conditional Exemptions Under the Securities Exchange Act...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-29

    ... (Jul. 23, 2009), 74 FR 37748 (Jul. 29, 2009) and Securities Exchange Act Release No. 61973 (Apr. 23... Exchange Act Release No. 60373 (Jul. 23, 2009), 74 FR 37740 (Jul. 29, 2009) (temporary exemptions in... Exchange Act Release No. 59578 (Mar. 13, 2009), 74 FR 11781 (Mar. 19, 2009), Securities Exchange...

  8. Communication Security for Control Systems in Smart Grid

    NASA Astrophysics Data System (ADS)

    Robles, Rosslin John; Kim, Tai-Hoon

    As an example of Control System, Supervisory Control and Data Acquisition systems can be relatively simple, such as one that monitors environmental conditions of a small office building, or incredibly complex, such as a system that monitors all the activity in a nuclear power plant or the activity of a municipal water system. SCADA systems are basically Process Control Systems, designed to automate systems such as traffic control, power grid management, waste processing etc. Connecting SCADA to the Internet can provide a lot of advantages in terms of control, data viewing and generation. SCADA infrastructures like electricity can also be a part of a Smart Grid. Connecting SCADA to a public network can bring a lot of security issues. To answer the security issues, a SCADA communication security solution is proposed.

  9. Secure thermal infrared communications using engineered blackbody radiation

    PubMed Central

    Liang, Xiaoxin; Hu, Fangjing; Yan, Yuepeng; Lucyszyn, Stepan

    2014-01-01

    The thermal (emitted) infrared frequency bands, from 20–40 THz and 60–100 THz, are best known for applications in thermography. This underused and unregulated part of the spectral range offers opportunities for the development of secure communications. The ‘THz Torch' concept was recently presented by the authors. This technology fundamentally exploits engineered blackbody radiation, by partitioning thermally-generated spectral noise power into pre-defined frequency channels; the energy in each channel is then independently pulsed modulated and multiplexing schemes are introduced to create a robust form of short-range secure communications in the far/mid infrared. To date, octave bandwidth (25–50 THz) single-channel links have been demonstrated with 380 bps speeds. Multi-channel ‘THz Torch' frequency division multiplexing (FDM) and frequency-hopping spread-spectrum (FHSS) schemes have been proposed, but only a slow 40 bps FDM scheme has been demonstrated experimentally. Here, we report a much faster 1,280 bps FDM implementation. In addition, an experimental proof-of-concept FHSS scheme is demonstrated for the first time, having a 320 bps data rate. With both 4-channel multiplexing schemes, measured bit error rates (BERs) of < 10−6 are achieved over a distance of 2.5 cm. Our approach represents a new paradigm in the way niche secure communications can be established over short links. PMID:24912871

  10. Secure thermal infrared communications using engineered blackbody radiation

    NASA Astrophysics Data System (ADS)

    Liang, Xiaoxin; Hu, Fangjing; Yan, Yuepeng; Lucyszyn, Stepan

    2014-06-01

    The thermal (emitted) infrared frequency bands, from 20-40 THz and 60-100 THz, are best known for applications in thermography. This underused and unregulated part of the spectral range offers opportunities for the development of secure communications. The `THz Torch' concept was recently presented by the authors. This technology fundamentally exploits engineered blackbody radiation, by partitioning thermally-generated spectral noise power into pre-defined frequency channels; the energy in each channel is then independently pulsed modulated and multiplexing schemes are introduced to create a robust form of short-range secure communications in the far/mid infrared. To date, octave bandwidth (25-50 THz) single-channel links have been demonstrated with 380 bps speeds. Multi-channel `THz Torch' frequency division multiplexing (FDM) and frequency-hopping spread-spectrum (FHSS) schemes have been proposed, but only a slow 40 bps FDM scheme has been demonstrated experimentally. Here, we report a much faster 1,280 bps FDM implementation. In addition, an experimental proof-of-concept FHSS scheme is demonstrated for the first time, having a 320 bps data rate. With both 4-channel multiplexing schemes, measured bit error rates (BERs) of < 10-6 are achieved over a distance of 2.5 cm. Our approach represents a new paradigm in the way niche secure communications can be established over short links.

  11. Secure thermal infrared communications using engineered blackbody radiation.

    PubMed

    Liang, Xiaoxin; Hu, Fangjing; Yan, Yuepeng; Lucyszyn, Stepan

    2014-01-01

    The thermal (emitted) infrared frequency bands, from 20-40 THz and 60-100 THz, are best known for applications in thermography. This underused and unregulated part of the spectral range offers opportunities for the development of secure communications. The 'THz Torch' concept was recently presented by the authors. This technology fundamentally exploits engineered blackbody radiation, by partitioning thermally-generated spectral noise power into pre-defined frequency channels; the energy in each channel is then independently pulsed modulated and multiplexing schemes are introduced to create a robust form of short-range secure communications in the far/mid infrared. To date, octave bandwidth (25-50 THz) single-channel links have been demonstrated with 380 bps speeds. Multi-channel 'THz Torch' frequency division multiplexing (FDM) and frequency-hopping spread-spectrum (FHSS) schemes have been proposed, but only a slow 40 bps FDM scheme has been demonstrated experimentally. Here, we report a much faster 1,280 bps FDM implementation. In addition, an experimental proof-of-concept FHSS scheme is demonstrated for the first time, having a 320 bps data rate. With both 4-channel multiplexing schemes, measured bit error rates (BERs) of < 10(-6) are achieved over a distance of 2.5 cm. Our approach represents a new paradigm in the way niche secure communications can be established over short links. PMID:24912871

  12. Inherent secure communications using lattice based waveform design.

    SciTech Connect

    Pugh, Matthew Owen

    2013-12-01

    The wireless communications channel is innately insecure due to the broadcast nature of the electromagnetic medium. Many techniques have been developed and implemented in order to combat insecurities and ensure the privacy of transmitted messages. Traditional methods include encrypting the data via cryptographic methods, hiding the data in the noise floor as in wideband communications, or nulling the signal in the spatial direction of the adversary using array processing techniques. This work analyzes the design of signaling constellations, i.e. modulation formats, to combat eavesdroppers from correctly decoding transmitted messages. It has been shown that in certain channel models the ability of an adversary to decode the transmitted messages can be degraded by a clever signaling constellation based on lattice theory. This work attempts to optimize certain lattice parameters in order to maximize the security of the data transmission. These techniques are of interest because they are orthogonal to, and can be used in conjunction with, traditional security techniques to create a more secure communication channel.

  13. On the design of chaos-based secure communication systems

    NASA Astrophysics Data System (ADS)

    Zaher, Ashraf A.; Abu-Rezq, Abdulnasser

    2011-09-01

    This paper discusses the topic of using chaotic models for constructing secure communication systems. It investigates three different case studies that use encryption/decryption functions with varying degrees of complexity and performance. The first case study explores synchronization of identical chaotic systems, which is considered the most crucial step when developing chaos-based secure communication systems. It proposes a fast mechanism for synchronizing the transmitter and the receiver that is based on the drive-response approach. The superiority and causality of this mechanism is demonstrated via contrasting its performance and practical implementation against that of the traditional method of Pecora and Carroll. The second case study explores the use of an improved cryptography method for improving the scrambling of the transmitted signals. The improvement is based on using both the transmitter states and parameters for performing the encryption. The security analysis of this method is analyzed, highlighting its advantages and limitation, via simulating intruder attacks to the communication channel. Finally, the third case study augments a parameter update law to the previous two designs such that the encryption method is more robust. It uses a decoupling technique for which the synchronization process is completely isolated from the parameter identification algorithm. The Lorenz system was used to exemplify all the suggested techniques, and the transmission of both analog and digital signals was explored, while investigating various techniques to optimize the performance of the proposed systems.

  14. Improving the security of secure direct communication based on the secret transmitting order of particles

    NASA Astrophysics Data System (ADS)

    Li, Xi-Han; Deng, Fu-Guo; Zhou, Hong-Yu

    2006-11-01

    We analyzed the security of the secure direct communication protocol based on the secret transmitting order of particles recently proposed by Zhu, Xia, Fan, and Zhang[Phys. Rev. A 73, 022338 (2006)] and found that this scheme is insecure if an eavesdropper, say Eve, wants to steal the secret message with Trojan horse attack strategies. The vital loophole in this scheme is that the two authorized users check the security of their quantum channel only once. Eve can insert another spy photon, an invisible photon, or a delay one in each photon which the sender Alice sends to the receiver Bob, and capture the spy photon when it returns from Bob to Alice. After the authorized users check the security, Eve can obtain the secret message according to the information about the transmitting order published by Bob. Finally, we present a possible improvement of this protocol.

  15. Improving the security of secure direct communication based on the secret transmitting order of particles

    SciTech Connect

    Li Xihan; Deng Fuguo; Zhou Hongyu

    2006-11-15

    We analyzed the security of the secure direct communication protocol based on the secret transmitting order of particles recently proposed by Zhu, Xia, Fan, and Zhang[Phys. Rev. A 73, 022338 (2006)] and found that this scheme is insecure if an eavesdropper, say Eve, wants to steal the secret message with Trojan horse attack strategies. The vital loophole in this scheme is that the two authorized users check the security of their quantum channel only once. Eve can insert another spy photon, an invisible photon, or a delay one in each photon which the sender Alice sends to the receiver Bob, and capture the spy photon when it returns from Bob to Alice. After the authorized users check the security, Eve can obtain the secret message according to the information about the transmitting order published by Bob. Finally, we present a possible improvement of this protocol.

  16. Ultra Wideband (UWB) communication vulnerability for security applications.

    SciTech Connect

    Cooley, H. Timothy

    2010-07-01

    RF toxicity and Information Warfare (IW) are becoming omnipresent posing threats to the protection of nuclear assets, and within theatres of hostility or combat where tactical operation of wireless communication without detection and interception is important and sometimes critical for survival. As a result, a requirement for deployment of many security systems is a highly secure wireless technology manifesting stealth or covert operation suitable for either permanent or tactical deployment where operation without detection or interruption is important The possible use of ultra wideband (UWB) spectrum technology as an alternative physical medium for wireless network communication offers many advantages over conventional narrowband and spread spectrum wireless communication. UWB also known as fast-frequency chirp is nonsinusoidal and sends information directly by transmitting sub-nanosecond pulses without the use of mixing baseband information upon a sinusoidal carrier. Thus UWB sends information using radar-like impulses by spreading its energy thinly over a vast spectrum and can operate at extremely low-power transmission within the noise floor where other forms of RF find it difficult or impossible to operate. As a result UWB offers low probability of detection (LPD), low probability of interception (LPI) as well as anti-jamming (AJ) properties in signal space. This paper analyzes and compares the vulnerability of UWB to narrowband and spread spectrum wireless network communication.

  17. The ACTS Flight System - Cost-Effective Advanced Communications Technology. [Advanced Communication Technology Satellite

    NASA Technical Reports Server (NTRS)

    Holmes, W. M., Jr.; Beck, G. A.

    1984-01-01

    The multibeam communications package (MCP) for the Advanced Communications Technology Satellite (ACTS) to be STS-launched by NASA in 1988 for experimental demonstration of satellite-switched TDMA (at 220 Mbit/sec) and baseband-processor signal routing (at 110 or 27.5 Mbit/sec) is characterized. The developmental history of the ACTS, the program definition, and the spacecraft-bus and MCP parameters are reviewed and illustrated with drawings, block diagrams, and maps of the coverage plan. Advanced features of the MPC include 4.5-dB-noise-figure 30-GHz FET amplifiers and 20-GHz TWTA transmitters which provide either 40-W or 8-W RF output, depending on rain conditions. The technologies being tested in ACTS can give frequency-reuse factors as high as 20, thus greatly expanding the orbit/spectrum resources available for U.S. communications use.

  18. A secure and robust information hiding technique for covert communication

    NASA Astrophysics Data System (ADS)

    Parah, S. A.; Sheikh, J. A.; Hafiz, A. M.; Bhat, G. M.

    2015-08-01

    The unprecedented advancement of multimedia and growth of the internet has made it possible to reproduce and distribute digital media easier and faster. This has given birth to information security issues, especially when the information pertains to national security, e-banking transactions, etc. The disguised form of encrypted data makes an adversary suspicious and increases the chance of attack. Information hiding overcomes this inherent problem of cryptographic systems and is emerging as an effective means of securing sensitive data being transmitted over insecure channels. In this paper, a secure and robust information hiding technique referred to as Intermediate Significant Bit Plane Embedding (ISBPE) is presented. The data to be embedded is scrambled and embedding is carried out using the concept of Pseudorandom Address Vector (PAV) and Complementary Address Vector (CAV) to enhance the security of the embedded data. The proposed ISBPE technique is fully immune to Least Significant Bit (LSB) removal/replacement attack. Experimental investigations reveal that the proposed technique is more robust to various image processing attacks like JPEG compression, Additive White Gaussian Noise (AWGN), low pass filtering, etc. compared to conventional LSB techniques. The various advantages offered by ISBPE technique make it a good candidate for covert communication.

  19. Proceedings of the Advanced Communications Technology Satellite (ACTS) Conference 2000

    NASA Technical Reports Server (NTRS)

    Bauer, Robert (Editor); Derwae, Robert (Editor)

    2000-01-01

    The ACTS experiments program, which began in December 1993 and consisted of 103 different experiments, has made significant contributions to minimizing the risk of advanced satellite communications technology. The ACTS Conference 2000 (AC2000) was held to report the results of the program since the last ACTS conference was held in 1995 and to celebrate the end of a very successful satellite program. The conference was held on May 31, 2000, as part of the 6th Ka-band Utilization Conference in Cleveland, Ohio. Approximately 280 representatives of industry, academia, and government attended. The conference was organized into two parts: a technical session during the day and an evening reception. During the day, a series of five technical sessions included presentations of 17 papers covering the results of the experiment activity and technical performance of the satellite. In the evening, a reception was held to celebrate the end of the ACTS Experiments Program on one of NASA's most successful experimental communications satellite. These proceedings were developed to capture the entire event, including the evening reception.

  20. Experiments applications guide: Advanced Communications Technology Satellite (ACTS)

    NASA Technical Reports Server (NTRS)

    1988-01-01

    This applications guide first surveys the capabilities of the Advanced Communication Technology Satellite (ACTS) system (both the flight and ground segments). This overview is followed by a description of the baseband processor (BBP) and microwave switch matrix (MSM) operating modes. Terminals operating with the baseband processor are referred to as low burst rate (LBR); and those operating with the microwave switch matrix, as high burst rate (HBR). Three very small-aperture terminals (VSATs), LBR-1, LBR-2, and HBR, are described for various ACTS operating modes. Also described is the NASA Lewis link evaluation terminal. A section on ACTS experiment opportunities introduces a wide spectrum of network control, telecommunications, system, and scientific experiments. The performance of the VSATs is discussed in detail. This guide is intended as a catalyst to encourage participation by the telecommunications, business, and science communities in a broad spectrum of experiments.

  1. Quantum cryptography for secure free-space communications

    NASA Astrophysics Data System (ADS)

    Hughes, Richard J.; Buttler, William T.; Kwiat, Paul G.; Lamoreaux, Steve K.; Luther, Gabriel G.; Morgan, George L.; Nordholt, Jane E.; Peterson, C. Glen

    1999-04-01

    The secure distribution of the secret random bit sequences known as 'key' material, is an essential precursor to their use for the encryption and decryption of confidential communications. Quantum cryptography is a new technique for secure key distribution with single-photon transmissions: Heisenberg's uncertainty principle ensures that an adversary can neither successfully tap the key transmissions, nor evade detection (eavesdropping raises the key error rate above a threshold value). We have developed experimental quantum cryptography systems based on the transmission of non- orthogonal photon polarization states to generate shared key material over line-of-sight optical links. Key material is built up using the transmission of a single-photon per bit of an initial secret random sequence. A quantum-mechanically random subset of this sequence is identified, becoming the key material after a data reconciliation stage with the sender. We have developed and tested a free-space quantum key distribution (QKD) system over an outdoor optical path of approximately 1 km at Los Alamos National Laboratory under nighttime conditions. Results show that free-space QKD can provide secure real-time key distribution between parties who have a need to communicate secretly. Finally, we examine the feasibility of surface to satellite QKD.

  2. All-optical signal processing technique for secure optical communication

    NASA Astrophysics Data System (ADS)

    Qian, Feng-chen; Su, Bing; Ye, Ya-lin; Zhang, Qian; Lin, Shao-feng; Duan, Tao; Duan, Jie

    2015-10-01

    Secure optical communication technologies are important means to solve the physical layer security for optical network. We present a scheme of secure optical communication system by all-optical signal processing technique. The scheme consists of three parts, as all-optical signal processing unit, optical key sequence generator, and synchronous control unit. In the paper, all-optical signal processing method is key technology using all-optical exclusive disjunction (XOR) gate based on optical cross-gain modulation effect, has advantages of wide dynamic range of input optical signal, simple structure and so on. All-optical XOR gate composed of two semiconductor optical amplifiers (SOA) is a symmetrical structure. By controlling injection current, input signal power, delay and filter bandwidth, the extinction ratio of XOR can be greater than 8dB. Finally, some performance parameters are calculated and the results are analyzed. The simulation and experimental results show that the proposed method can be achieved over 10Gbps optical signal encryption and decryption, which is simple, easy to implement, and error-free diffusion.

  3. Quantum cryptography for secure free-space communications

    SciTech Connect

    Hughes, R.J.; Buttler, W.T.; Kwiat, P.G.; Lamoreaux, S.K.; Luther, G.G.; Morgan, G.L.; Nordholt, J.E.; Peterson, C.G.

    1999-03-01

    The secure distribution of the secret random bit sequences known as key material, is an essential precursor to their use for the encryption and decryption of confidential communications. Quantum cryptography is a new technique for secure key distribution with single-photon transmissions: Heisenberg`s uncertainty principle ensures that an adversary can neither successfully tap the key transmissions, nor evade detection (eavesdropping raises the key error rate above a threshold value). The authors have developed experimental quantum cryptography systems based on the transmission of non-orthogonal photon polarization states to generate shared key material over line-of-sight optical links. Key material is built up using the transmission of a single-photon per bit of an initial secret random sequence. A quantum-mechanically random subset of this sequence is identified, becoming the key material after a data reconciliation stage with the sender. The authors have developed and tested a free-space quantum key distribution (QKD) system over an outdoor optical path of {approximately}1 km at Los Alamos National Laboratory under nighttime conditions. Results show that free-space QKD can provide secure real-time key distribution between parties who have a need to communicate secretly. Finally, they examine the feasibility of surface to satellite QKD.

  4. Fast massive preventive security and information communication systems

    NASA Astrophysics Data System (ADS)

    Akopian, David; Chen, Philip; Miryakar, Susheel; Kumar, Abhinav

    2008-04-01

    We present a fast massive information communication system for data collection from distributive sources such as cell phone users. As a very important application one can mention preventive notification systems when timely notification and evidence communication may help to improve safety and security through wide public involvement by ensuring easy-to-access and easy-to-communicate information systems. The technology significantly simplifies the response to the events and will help e.g. special agencies to gather crucial information in time and respond as quickly as possible. Cellular phones are nowadays affordable for most of the residents and became a common personal accessory. The paper describes several ways to design such systems including existing internet access capabilities of cell phones or downloadable specialized software. We provide examples of such designs. The main idea is in structuring information in predetermined way and communicating data through a centralized gate-server which will automatically process information and forward it to a proper destination. The gate-server eliminates a need in knowing contact data and specific local community infrastructure. All the cell phones will have self-localizing capability according to FCC E911 mandate, thus the communicated information can be further tagged automatically by location and time information.

  5. SPECS: Secure and Privacy Enhancing Communications Schemes for VANETs

    NASA Astrophysics Data System (ADS)

    Chim, T. W.; Yiu, S. M.; Hui, L. C. K.; Jiang, Zoe L.; Li, Victor O. K.

    Vehicular ad hoc network (VANET) is an emerging type of networks which facilitates vehicles on roads to communicate for driving safety. The basic idea is to allow arbitrary vehicles to broadcast ad hoc messages (e.g. traffic accidents) to other vehicles. However, this raises the concern of security and privacy. Messages should be signed and verified before they are trusted while the real identity of vehicles should not be revealed, but traceable by authorized party. Existing solutions either rely heavily on a tamper-proof hardware device, or cannot satisfy the privacy requirement and do not have an effective message verification scheme. In this paper, we provide a software-based solution which makes use of only two shared secrets to satisfy the privacy requirement and gives lower message overhead and at least 45% higher successful rate than previous solutions in the message verification phase using the bloom filter and the binary search techniques. We also provide the first group communication protocol to allow vehicles to authenticate and securely communicate with others in a group of known vehicles.

  6. Glucoweb: a case study of secure, remote biomonitoring and communication.

    PubMed Central

    Nigrin, D. J.; Kohane, I. S.

    2000-01-01

    As the Internet begins to play a greater role in many healthcare processes, it is inevitable that remote monitoring of patients' physiological parameters over the Internet will become increasingly commonplace. Internet-based communication between patients and their healthcare providers has already become prevalent, and has gained significant attention in terms of confidentiality issues. However, transmission of data directly from patients' physiological biomonitoring devices over the Web has garnered significantly less focus, especially in the area of authentication and security. In this paper, we describe a prototype system called Glucoweb, which allows patients with diabetes mellitus to transmit their self-monitored blood glucose data directly from their personal glucometer device to their diabetes care provider over the Internet. No customized software is necessary on the patient's computer, only a Web browser and active Internet connection. We use this example to highlight key authentication and security measures that should be considered for devices that transmit healthcare data to remote locations. PMID:11079956

  7. The braided single-stage protocol for quantum secure communication

    NASA Astrophysics Data System (ADS)

    Darunkar, Bhagyashri; Verma, Pramode K.

    2014-05-01

    This paper presents the concept and implementation of a Braided Single-stage Protocol for quantum secure communication. The braided single-stage protocol is a multi-photon tolerant secure protocol. This multi-photon tolerant protocol has been implemented in the laboratory using free-space optics technology. The proposed protocol capitalizes on strengths of the three-stage protocol and extends it with a new concept of braiding. This protocol overcomes the limitations associated with the three-stage protocol in the following ways: It uses the transmission channel only once as opposed to three times in the three-stage protocol, and it is invulnerable to man-in-the-middle attack. This paper also presents the error analysis resulting from the misalignment of the devices in the implementation. The experimental results validate the efficient use of transmission resources and improvement in the data transfer rate.

  8. Deterministic secure communications using two-mode squeezed states

    SciTech Connect

    Marino, Alberto M.; Stroud, C. R. Jr.

    2006-08-15

    We propose a scheme for quantum cryptography that uses the squeezing phase of a two-mode squeezed state to transmit information securely between two parties. The basic principle behind this scheme is the fact that each mode of the squeezed field by itself does not contain any information regarding the squeezing phase. The squeezing phase can only be obtained through a joint measurement of the two modes. This, combined with the fact that it is possible to perform remote squeezing measurements, makes it possible to implement a secure quantum communication scheme in which a deterministic signal can be transmitted directly between two parties while the encryption is done automatically by the quantum correlations present in the two-mode squeezed state.

  9. Secure Communication Application of Josephson Tetrode in THz Region

    NASA Astrophysics Data System (ADS)

    Sahri, Nurliyana Bte Mohd; Yoshimori, Shigeru

    We numerically demonstrate the generation of chaos in a four-terminal superconductive device made of five Jospehson weak-link junctions, Josephson Tetrode. We calculate the dynamics of electrical voltages across the junctions when one of the normal resistances in varied. We confirm the generation of chaos by using temporal waveforms, three-dimensional attractors and Lyapunov exponent of chaotic attractor. We numerically investigated the threshold voltage dependence and sampling time dependence of random bits. Jospehson Tetrode is a promising superconductive device applicable to secure communication in THz region.

  10. Chaos-based secure communication system using logistic map

    NASA Astrophysics Data System (ADS)

    Singh, Narendra; Sinha, Aloka

    2010-03-01

    We propose a new opto-electronic secure communication system using logistic map and pulse position modulation. A modified version of the electronic circuit of the logistic map is used to generate the chaotic signal. Pulse position modulation scheme together with the logistic map has been used to encrypt the signal. Optical fiber has been used to demonstrate the proposed scheme. Eye pattern has been used to verify the noise-like nature of the encrypted signal. Opto-electronic implementation of the technique has been carried out. Experimental results are presented to verify the validity of the proposed technique.

  11. Security of direct communication quantum channel with feedback

    NASA Astrophysics Data System (ADS)

    Usenko, Constantin V.

    2015-01-01

    In the direct communication quantum channels, the authorized recipient (Bob) and the non-authorized recipient (Eve) have different abilities for verification of received information. Bob can apply the feedback to commit the sender (Alice) to perform verification. Eve has to use for verification an indirect method based on the measurement of a set of incompatible observables enough for determination of the coding basis used by Alice. In the protocol of direct communication, regular modification of coding basis and masking it with an equilibrium in average information carrier density matrix prevents reconstruction of coding basis by the results of Eve’s measurements of an arbitrary set of observables. This provides unconditional security of the channel.

  12. ACTS TDMA network control. [Advanced Communication Technology Satellite

    NASA Technical Reports Server (NTRS)

    Inukai, T.; Campanella, S. J.

    1984-01-01

    This paper presents basic network control concepts for the Advanced Communications Technology Satellite (ACTS) System. Two experimental systems, called the low-burst-rate and high-burst-rate systems, along with ACTS ground system features, are described. The network control issues addressed include frame structures, acquisition and synchronization procedures, coordinated station burst-time plan and satellite-time plan changes, on-board clock control based on ground drift measurements, rain fade control by means of adaptive forward-error-correction (FEC) coding and transmit power augmentation, and reassignment of channel capacities on demand. The NASA ground system, which includes a primary station, diversity station, and master control station, is also described.

  13. 45 CFR 287.105 - What provisions of the Social Security Act govern the NEW Program?

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 45 Public Welfare 2 2014-10-01 2012-10-01 true What provisions of the Social Security Act govern the NEW Program? 287.105 Section 287.105 Public Welfare Regulations Relating to Public Welfare OFFICE....105 What provisions of the Social Security Act govern the NEW Program? NEW Programs are subject...

  14. 45 CFR 287.105 - What provisions of the Social Security Act govern the NEW Program?

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 45 Public Welfare 2 2013-10-01 2012-10-01 true What provisions of the Social Security Act govern the NEW Program? 287.105 Section 287.105 Public Welfare Regulations Relating to Public Welfare OFFICE....105 What provisions of the Social Security Act govern the NEW Program? NEW Programs are subject...

  15. 45 CFR 287.105 - What provisions of the Social Security Act govern the NEW Program?

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 45 Public Welfare 2 2012-10-01 2012-10-01 false What provisions of the Social Security Act govern the NEW Program? 287.105 Section 287.105 Public Welfare Regulations Relating to Public Welfare OFFICE....105 What provisions of the Social Security Act govern the NEW Program? NEW Programs are subject...

  16. 45 CFR 287.105 - What provisions of the Social Security Act govern the NEW Program?

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 45 Public Welfare 2 2010-10-01 2010-10-01 false What provisions of the Social Security Act govern the NEW Program? 287.105 Section 287.105 Public Welfare Regulations Relating to Public Welfare OFFICE....105 What provisions of the Social Security Act govern the NEW Program? NEW Programs are subject...

  17. 45 CFR 287.105 - What provisions of the Social Security Act govern the NEW Program?

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 45 Public Welfare 2 2011-10-01 2011-10-01 false What provisions of the Social Security Act govern the NEW Program? 287.105 Section 287.105 Public Welfare Regulations Relating to Public Welfare OFFICE....105 What provisions of the Social Security Act govern the NEW Program? NEW Programs are subject...

  18. First Annual Report to Congress on Title XX of the Social Security Act.

    ERIC Educational Resources Information Center

    Department of Health, Education, and Welfare, Washington, DC.

    This annual report to Congress on Title XX of the Social Security Act reports on the operation of the 1976 fiscal year program. Preceding the report are descriptive highlights of the program. Title XX of the Social Security Act changes the role and relationships of the Department of Health, Education, and Welfare; the individual states; and…

  19. GSM-PKI solution enabling secure mobile communications.

    PubMed

    Jelekäinen, Pekka

    2004-03-31

    Because of its wide distribution and ease of use, the mobile phone, as a reliable personal communications channel, offers an excellent basis for the provision of reliable electronic communications services. In Finland, ca. 75% of the citizens have a mobile phone and, at present and most likely also in the future, it is the most widely spread service channel allowing reliable electronic communications. Despite the restricted functions of the mobile phone, the citizens can use the phone also as a communications medium. In 2001, the Finns sent over 1 billion SMS messages. In Finland, TeliaSonera Finland Oyi and the Population Register Centre (PRC) have closed a co-operation agreement with the aim of creating a mobile phone service for the electronic identification of a person. The co-operation launched is a significant development project from the perspective of the citizens. As a result, the consumers will have a new alternative for reliable electronic communications and commerce in data networks in addition to the electronic identification card. In the future, it will be possible to use the services of both public administration and the private sector by means of a mobile phone more reliably than before, without a physical visit, e.g. to a health centre or to another provider of healthcare services. The possibility of identification and signature by a mobile phone allows an easier provision of versatile services irrespective of time and place, because, in addition to voice, text message, and WAP functions, the service can be utilised also in communications services through the Internet, in which case, the mobile phone acts like a card reader. From the perspective of reliable personal mobile communications, the healthcare sector is one of the most significant and challenging application areas. PMID:15066565

  20. 75 FR 7978 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Transportation...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-23

    ... Exemptions; Department of Homeland Security Transportation Security Administration-023 Workplace Violence... Security Administration-023 Workplace Violence Prevention Program System of Records and this proposed... a new system of records under the Privacy Act (5 U.S.C. 552a) titled, DHS/TSA-023 Workplace...

  1. 78 FR 55657 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Transportation...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-11

    ...The Department of Homeland Security is giving concurrent notice of a newly established system of records pursuant to the Privacy Act of 1974 for the ``Department of Homeland Security/Transportation Security Administration-021, TSA Pre[check]TM; Application Program System of Records'' and this proposed rulemaking. In this proposed rulemaking, the Department proposes to exempt......

  2. Crime Awareness and Campus Security Act. Important Information for Community College Trustees and Administrators.

    ERIC Educational Resources Information Center

    Shepard, Ira Michael; Schwartz, Allen D.

    The Crime Awareness and Campus Security Act (CACSA) of 1990 requires higher education institutions to prepare, publish, and distribute to all students and employees an annual security report disclosing campus security policies and measures, and statistical data on criminal offenses and arrests, by September 1, 1992. This report was developed to…

  3. 75 FR 8096 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-023...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-23

    ... Security Administration--023 Workplace Violence Prevention Program System of Records AGENCY: Privacy Office..., ``Department of Homeland Security/Transportation Security Administration--023 Workplace Violence Prevention... and maintain records on their Workplace Violence Prevention Program. Additionally, the Department...

  4. Parameter adaptation technique for rapid synchronization and secure communication

    NASA Astrophysics Data System (ADS)

    Mittal, A. K.; Dwivedi, A.; Dwivedi, S.

    2014-06-01

    An effort is made here to show how parameter adaptation can be used for achieving rapid synchronization between two chaotic systems in a time much smaller than the time scale of chaotic oscillations. This rapid synchronization can be used for faster and more secure communication of digital messages. Different symbols of the message are coded by assigning different values to a parameter set. At the receiving end the parameter values quickly adapt to the changing transmitter parameters, thereby permitting the messages to be decoded. The technique presented here is significantly more secure compared to other similar schemes because in our scheme the transmitting parameters change so rapidly that an intruder cannot infer any information about the attractors corresponding to the different parameter values. Another feature, which enhances security, is that a subsystem of the transmitter can be changed, without having to convey this information to the bona fide recipient. Thus for the same plaintext and the same key, several different cipher-texts can be generated. Further, the variables, whose evolution equations contain the coding parameters, are not transmitted.

  5. Text Messaging to Communicate With Public Health Audiences: How the HIPAA Security Rule Affects Practice

    PubMed Central

    Karasz, Hilary N.; Eiden, Amy; Bogan, Sharon

    2013-01-01

    Text messaging is a powerful communication tool for public health purposes, particularly because of the potential to customize messages to meet individuals’ needs. However, using text messaging to send personal health information requires analysis of laws addressing the protection of electronic health information. The Health Insurance Portability and Accountability Act (HIPAA) Security Rule is written with flexibility to account for changing technologies. In practice, however, the rule leads to uncertainty about how to make text messaging policy decisions. Text messaging to send health information can be implemented in a public health setting through 2 possible approaches: restructuring text messages to remove personal health information and retaining limited personal health information in the message but conducting a risk analysis and satisfying other requirements to meet the HIPAA Security Rule. PMID:23409902

  6. Gigabit Satellite Network for NASA's Advanced Communication Technology Satellite (ACTS)

    NASA Technical Reports Server (NTRS)

    Hoder, Douglas; Bergamo, Marcos

    1996-01-01

    The advanced communication technology satellite (ACTS) gigabit satellite network provides long-haul point-to-point and point-to-multipoint full-duplex SONET services over NASA's ACTS. at rates up to 622 Mbit/s (SONET OC-12), with signal quality comparable to that obtained with terrestrial fiber networks. Data multiplexing over the satellite is accomplished using time-division multiple access (TDMA) techniques coordinated with the switching and beam hopping facilities provided by ACTS. Transmissions through the satellite are protected with Reed-Solomon encoding. providing virtually error-free transmission under most weather conditions. Unique to the system are a TDMA frame structure and satellite synchronization mechanism that allow: (a) very efficient utilization of the satellite capacity: (b) over-the-satellite dosed-loop synchronization of the network in configurations with up to 64 ground stations: and (c) ground station initial acquisition without collisions with existing signalling or data traffic. The user interfaces are compatible with SONET standards, performing the function of conventional SONET multiplexers and. as such. can be: readily integrated with standard SONET fiber-based terrestrial networks. Management of the network is based upon the simple network management protocol (SNMP). and includes an over-the-satellite signalling network and backup terrestrial internet (IP-based) connectivity. A description of the ground stations is also included.

  7. 77 FR 75211 - Order Granting Conditional Exemptions Under the Securities Exchange Act of 1934 in Connection...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-19

    ..., Exchange Act Release No. 67453 (Jul. 18, 2012), 77 FR 48207 (Aug. 13, 2012) (Joint Final Rule with the CFTC... FR 25224 (Nov. 29, 1972). \\27\\ In addition to the Exchange Act provisions specific to security-based... Requirements Adopting Release''), Exchange Act Release No. 68071 (Oct. 18, 2012), 77 FR 70213 (Nov. 23,...

  8. Secure transmission of shipper/receiver confirmatory measurements. [Gillaroo Encrypted Secure Communication

    SciTech Connect

    Tisinger, R.M.; Brumfield, T.

    1988-01-01

    Shipper/receiver confirmatory measurements will be performed at Y-12 using equipment designed by Y-12 and the Safeguards Assay Group at Los Alamos. Equipment consists of three stationary NaI(Tl) gamma-ray counter arrays and a Digital Equipment Corporation Micro-11 processor for processing data. In the case of outgoing shipments, the counter data will be incorporated in a shipping file with other necessary documentation and transmitted to the intended recipient. In the case of incoming shipments, this station will receive a similar file from the sending organization. Protection of all data at the S/RD level is required. Transmission of the data files can be made point-to-point over telephone lines with proper encryption. Two commercial devices used in conjunction with a personal computer are being evaluated to provide secure communication endorsed by the National Security Agency (NSA). One device is the Gillaroo from P. E. Systems, Inc., and the other is the STU-III, which is available as a PC board or a standalone unit, whereas the STU-III is a Secure Telephone Unit with an RS-232 port for connection to a computer. In both cases, file encryption is performed in hardware using keys supplied by NSA. The prime advantage of this approach is a simplicity. Aside from key management, the whole operation can be automatically controlled by command files on the computer without involving additional interfaces with secure networks or mail systems. Additional benefits are rapid response, immediate confirmation of receipt of message, a communication channel independent of the shipment itself, and low cost.

  9. National Security Agency Data Collection Review Act of 2014

    THOMAS, 113th Congress

    Rep. Carney, John C., Jr. [D-DE-At Large

    2014-01-15

    03/20/2014 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  10. Protecting the Privacy of Social Security Numbers Act of 2013

    THOMAS, 113th Congress

    Rep. Frelinghuysen, Rodney P. [R-NJ-11

    2013-05-22

    06/14/2013 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  11. Transportation Security Administration Efficiency and Flexibility Act of 2011

    THOMAS, 112th Congress

    Sen. Wicker, Roger F. [R-MS

    2011-07-13

    07/13/2011 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  12. Personal Data Privacy and Security Act of 2014

    THOMAS, 113th Congress

    Rep. Shea-Porter, Carol [D-NH-1

    2014-02-04

    03/20/2014 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  13. Advanced Communications Technology Satellite (ACTS) Used for Inclined Orbit Operations

    NASA Technical Reports Server (NTRS)

    Bauer, Robert A.

    2000-01-01

    The Advanced Communications Technology Satellite (ACTS) is operated by the NASA Glenn Research Center at Lewis Field 24 hours a day, 7 days a week. ACTS, which was launched in September 1993, is in its 7th year of operations, far exceeding the system s planned 2 years of operations and 4 years of designed mission life. After 5 successful years of operating as a geostationary satellite, the spacecraft s North-South stationkeeping was discontinued in August 1998. The system is now operating in an inclined orbit that increases at a rate of 0.8 /yr. With only scarce fuel remaining, operating in this mode extends the usage of the still totally functional payload. Although tracking systems are now needed on the experimenter Earth stations, experiment operations have continued with very little disruption. This is the only known geosynchronous Ka-band (30/20 GHz) spot-beam satellite operating in an inclined orbit. The project began its transition from geostationary operations to inclined operations in August 1998. This did not interrupt operations and was transparent to the experimenters on the system. For the space segment, new daily procedures were implemented to maintain the pointing of the system s narrow 0.3 spot beams while the spacecraft drifts in the North-South direction. For the ground segment, modifications were designed, developed, and fielded for the three classes of experimenter Earth stations. With the next generation of commercial satellite systems still being developed, ACTS remains the only operational testbed for Ka-band geosynchronous satellite communications over the Western hemisphere. Since inclined orbit operations began, the ACTS experiments program has supported 43 investigations by industry, Government, and academic organizations, as well as four demonstrations. The project s goals for inclined-orbit operations now reflect a narrower focus in the types of experiments that will be done. In these days of "faster, better, cheaper," NASA is seeking

  14. 47 CFR 0.414 - The Communications Act and other statutory materials.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 1 2012-10-01 2012-10-01 false The Communications Act and other statutory materials. 0.414 Section 0.414 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL COMMISSION ORGANIZATION General Information Printed Publications § 0.414 The Communications Act and other statutory materials. This publication, with packets...

  15. 47 CFR 0.414 - The Communications Act and other statutory materials.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 1 2014-10-01 2014-10-01 false The Communications Act and other statutory materials. 0.414 Section 0.414 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL COMMISSION ORGANIZATION General Information Printed Publications § 0.414 The Communications Act and other statutory materials. This publication, with packets...

  16. A Sensor and Communications System for Containerized-Cargo Security

    SciTech Connect

    Leach Jr., R R

    2005-02-10

    A public/private collaboration between federal, state, provincial, and local U.S. and Canadian governmental organizations, called the Canada - United States Cargo Security Project has been formed, with the goal to improve security of containerized cargo moving from overseas locations into eastern Canadian provinces and the Northeastern United States. The current phase of this project has two technical objectives. These are: (1) to build and test a prototype in-container sensor system able to detect unauthorized entry into the container and the presence of radioactive material, to record geographical location and environmental data, and to transmit this information via satellite communications to a remote monitoring facility, and (2) to develop a secure website where data from the in-container sensors and other information will be displayed in real or near-real time and can be made available to law enforcement and emergency response organizations as appropriate. This paper will describe these activities, currently being undertaken by the Lawrence Livermore National Laboratory. An additional goal of the project's current phase is to integrate multi-jurisdictional training and first-responder exercises while monitoring and tracking container shipments from overseas to the US via Canadian ports-of-entry into North America. This activity is being undertaken by other project partners, which include the National Infrastructure Institute--Center for Infrastructure Expertise (NI2CIE), Transport Canada, Canadian Provinces of Quebec and Nova Scotia, Ports of Halifax and Montreal, U.S. Coast Guard (First Coast Guard District), States of New Hampshire, Maine, Vermont, and New York and the Port of Portland.

  17. 76 FR 21741 - Twenty-First Century Communications and Video Programming Accessibility Act; Announcement of Town...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-18

    ...In this document, the Commission announces that it held a Town Hall meeting on The Twenty-First Century Communications and Video Programming Accessibility Act (the Act or CVAA) hosted by the California State University at Northridge (CSUN). The Town Hall meeting provided an orientation to the Act, and discussed the advanced communications and video programming changes required by the...

  18. Advanced Communication Technology Satellite (ACTS) multibeam antenna analysis and experiment

    NASA Technical Reports Server (NTRS)

    Acosta, Roberto J.; Lagin, Alan R.; Larko, Jeffrey M.; Narvaez, Adabelle

    1992-01-01

    One of the most important aspects of a satellite communication system design is the accurate estimation of antenna performance degradation. Pointing error, end coverage gain, peak gain degradation, etc. are the main concerns. The thermal or dynamic distortions of a reflector antenna structural system can affect the far-field antenna power distribution in a least four ways. (1) The antenna gain is reduced; (2) the main lobe of the antenna can be mispointed thus shifting the destination of the delivered power away from the desired locations; (3) the main lobe of the antenna pattern can be broadened, thus spreading the RF power over a larger area than desired; and (4) the antenna pattern sidelobes can increase, thus increasing the chances of interference among adjacent beams of multiple beam antenna system or with antenna beams of other satellites. The in-house developed NASA Lewis Research Center thermal/structural/RF analysis program was designed to accurately simulate the ACTS in-orbit thermal environment and predict the RF antenna performance. The program combines well establish computer programs (TRASYS, SINDA and NASTAN) with a dual reflector-physical optics RF analysis program. The ACTS multibeam antenna configuration is analyzed and several thermal cases are presented and compared with measurements (pre-flight).

  19. 76 FR 26549 - Removal of Certain References to Credit Ratings Under the Securities Exchange Act of 1934

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-06

    ..., Securities Act of 1933 (``Securities Act'') Release No. 9193 (Mar. 3, 2011), 76 FR 12896 (Mar. 9, 2011) and Security Ratings, Exchange Act Release No. 63874 (Feb. 9, 2011), 76 FR 8946 (Feb. 16, 2011). As is... Release No. 11497 (Jun. 26, 1975), 40 FR 29795 (Jul. 16, 1975) and 17 CFR 240.15c3-1. \\12\\ See...

  20. 76 FR 30374 - Cruise Vessel Safety and Security Act of 2010, Available Technology

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-25

    ... published on April 11, 2000 (65 FR 19477), or you may visit http://dms.dot.gov . Basis and Purpose On July... SECURITY Coast Guard Cruise Vessel Safety and Security Act of 2010, Available Technology AGENCY: Coast... public comment on the availability of technology to meet certain provisions of the Cruise Vessel...

  1. P.L. 110-140, "Energy Independence and Security Act of 2007", 2007

    SciTech Connect

    2007-12-19

    The Energy Independence and Security Act of 2007 (EISA), signed into law on December 19, 2007, set forth an agenda for improving U.S. energy security across the entire economy. While industrial energy efficiency is specifically called out in Title IV, Subtitle D, other EISA provisions also apply to AMO activities.

  2. 77 FR 43639 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-25

    ... From the Federal Register Online via the Government Publishing Office SOCIAL SECURITY ADMINISTRATION Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA... Vocational Rehabilitation and Employment Records--VA'' (58VA21/22/28), first published at 74 FR 14865...

  3. 76 FR 60387 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Federal...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-29

    ...The Department of Homeland Security is giving concurrent notice of a newly established system of records pursuant to the Privacy Act of 1974 for the ``Department of Homeland Security/Federal Emergency Management Agency-012 Suspicious Activity Reporting System of Records'' and this proposed rulemaking. In this proposed rulemaking, the Department proposes to exempt portions of the system of......

  4. 32 CFR Appendix A to Part 1292 - Section 21 of the Internal Security Act of 1950

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Section 21 of the Internal Security Act of 1950 A Appendix A to Part 1292 National Defense Other Regulations Relating to National Defense DEFENSE LOGISTICS AGENCY MISCELLANEOUS SECURITY OF DLA ACTIVITIES AND RESOURCES Pt. 1292, App. A Appendix A to...

  5. An integrated solution for secure group communication in wide-area networks

    SciTech Connect

    Agarwal, Deborah A.; Chevassut, Olivier; Thompson, Mary; Tsudik, Gene

    2001-04-01

    Many distributed applications require a secure reliable group communication system to provide coordination among the application components. This paper describes a secure group layer (SGL) which bundles a reliable group communication system, a group authorization and access control mechanism, and a group key agreement protocol to provide a comprehensive and practical secure group communication platform. SGL also encapsulates the standard message security services (i.e, confidentiality, authenticity and integrity). A number of challenging issues encountered in the design of SGL are brought to light and experimental results obtained with a prototype implementation are discussed.

  6. P.L. 96-294, "Energy Security Act" (1980)

    SciTech Connect

    2011-12-13

    Declares it to be the purpose of this title to reduce dependence on foreign energy resources by producing synthetic fuel. Part A: Development of Synthetic Fuel Under the Defense Production Act of 1950 - Defense Production Act Amendments of 1980 - Amends the Defense Production Act of 1950 to include within the policy objectives of such Act Government preparedness to contend with foreign actions which could reduce or terminate the availability of material, including energy, which is crucial to national defense. States that greater independence in domestic energy supplies is necessary to national defense preparedness. Designates "energy" as a "strategic and critical material." States that such designation shall not give the President any authority: (1) for the mandatory allocation or pricing of any fuel or feedstock; or (2) to engage in the production of energy in any manner whatsoever, except for synthetic fuel production.

  7. Border Enforcement Security Task Force Act of 2011

    THOMAS, 112th Congress

    Rep. Cuellar, Henry [D-TX-28

    2011-02-17

    02/24/2011 Referred to the Subcommittee on Border and Maritime Security. (All Actions) Notes: For further action, see H.R.915, which became Public Law 112-205 on 12/7/2012. Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  8. Domestic Fuel for Enhancing National Security Act of 2011

    THOMAS, 112th Congress

    Sen. Murray, Patty [D-WA

    2011-05-25

    05/25/2011 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (text of measure as introduced: CR S3345) (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  9. Homeland Security Cybersecurity Boots-on-the-Ground Act

    THOMAS, 113th Congress

    Rep. Clarke, Yvette D. [D-NY-9

    2013-09-17

    07/29/2014 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  10. Continuing Chemical Facilities Antiterrorism Security Act of 2011

    THOMAS, 112th Congress

    Sen. Collins, Susan M. [R-ME

    2011-03-03

    10/20/2011 By Senator Lieberman from Committee on Homeland Security and Governmental Affairs filed written report. Report No. 112-90. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  11. Cyber Security and American Cyber Competitiveness Act of 2011

    THOMAS, 112th Congress

    Sen. Reid, Harry [D-NV

    2011-01-25

    01/25/2011 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (text of measure as introduced: CR S130) (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  12. Homeland Security Science and Technology Authorization Act of 2010

    THOMAS, 111th Congress

    Rep. Clarke, Yvette D. [D-NY-11

    2010-03-15

    07/21/2010 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  13. Safe and Secure Federal Websites Act of 2014

    THOMAS, 113th Congress

    Rep. Bentivolio, Kerry L. [R-MI-11

    2013-12-03

    07/29/2014 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  14. Public Transit Security and Local Law Enforcement Support Act

    THOMAS, 112th Congress

    Rep. Turner, Robert L. [R-NY-9

    2012-01-31

    09/13/2012 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  15. The Computer Fraud and Abuse Act of 1986 and the Computer Security Act of 1987: Impact on incident response efforts

    SciTech Connect

    Schultz, E.E.

    1991-10-11

    The purpose of this paper is to evaluate two Federal statutes, the Computer Fraud and Abuse Act of 1986 and the Computer Security Act of 1987, from the perspective of computer security incident response efforts. First, the major relevant provisions of each statute are presented. Next, revisions to each statute are proposed, and additional areas needing to be addressed in future legislation are presented. The major conclusion is that these statutes represent a start in the legislative process to deter and prevent computer offenses such as unauthorized access to systems. However, many revisions and additions are needed before such legislation will significantly impact incident response efforts. In addition, legislation alone cannot bring about the degree of change necessary to address the range of computer security threats that presently exist.

  16. 6 CFR Appendix A to Part 5 - FOIA/Privacy Act Offices of the Department of Homeland Security

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 6 Domestic Security 1 2011-01-01 2011-01-01 false FOIA/Privacy Act Offices of the Department of Homeland Security A Appendix A to Part 5 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE... of the Department of Homeland Security I. For the following Headquarters components of the...

  17. 6 CFR Appendix A to Part 5 - FOIA/Privacy Act Offices of the Department of Homeland Security

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 6 Domestic Security 1 2013-01-01 2013-01-01 false FOIA/Privacy Act Offices of the Department of Homeland Security A Appendix A to Part 5 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE... of the Department of Homeland Security I. For the following Headquarters components of the...

  18. 6 CFR Appendix A to Part 5 - FOIA/Privacy Act Offices of the Department of Homeland Security

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 6 Domestic Security 1 2014-01-01 2014-01-01 false FOIA/Privacy Act Offices of the Department of Homeland Security A Appendix A to Part 5 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE... of the Department of Homeland Security I. For the following Headquarters components of the...

  19. 78 FR 28867 - Privacy Act of 1974; Department of Homeland Security/U.S. Immigration and Customs Enforcement-014...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-16

    ...In accordance with the Privacy Act of 1974, the Department of Homeland Security proposes to establish a new Department of Homeland Security system of records titled, ``Department of Homeland Security/ U.S. Immigration and Customs Enforcement--014 Homeland Security Investigations Forensic Laboratory System of Records.'' This system of records allows the Department of Homeland Security/U.S.......

  20. Information Data Security Specialists' and Business Leaders' Experiences Regarding Communication Challenges

    ERIC Educational Resources Information Center

    Lopez, Robert H.

    2012-01-01

    The problem addressed was the need to maintain data security in the field of information technology. Specifically, the breakdown of communication between business leaders and data security specialists create risks to data security. The purpose of this qualitative phenomenological study was to determine which factors would improve communication…

  1. National Security Letters, the USA PATRIOT Act, and the Constitution: The Tensions between National Security and Civil Rights

    ERIC Educational Resources Information Center

    Gorham-Oscilowski, Ursula; Jaeger, Paul T.

    2008-01-01

    In response to the terrorist attacks of 9/11, the USA PATRIOT Act greatly expanded the ability of the Federal Bureau of Investigation to use National Security Letters (NSLs) in investigations and the contexts in which they could be used by relaxing the standards under which NSLs could be employed. NSLs allow investigators to acquire a significant…

  2. Communication in Change - Voice over IP in Safety and Security Critical Communication Networks

    NASA Astrophysics Data System (ADS)

    Zeilinger, Heimo; Sevcik, Berndt; Turek, Thomas; Zucker, Gerhard

    During the last decade communication technology has changed rapidly. Due to its decreasing costs and rising expansion, IP (Internet Protocol) technology has found its way to areas that have long been the domain of public-switched telephone networks (PSTN). Voice over IP (VoIP) applications are widely used not only for phone calls or common Internet conferences, but also tend to be used for safety critical communication applications. Hence security and safety topics arise, which pose new challenges in this area of research. The authors are convinced that new issues on the network layer as well as on the application layer require detailed analysis. Hence this paper gives an overview on latest developments in this area, and states the authors’ view on this topic. Thereby safety and security issues are faced from different abstraction layers. On the one hand the network layer and on the other hand the application layer focusing on middleware systems in the area of service oriented architectures (SOAs).

  3. Speech Acts across Cultures: Challenges to Communication in a Second Language. Studies on Language Acquisition, 11.

    ERIC Educational Resources Information Center

    Gass, Susan M., Ed.; Neu, Joyce, Ed.

    Articles on speech acts and intercultural communication include: "Investigating the Production of Speech Act Sets" (Andrew Cohen); "Non-Native Refusals: A Methodological Perspective" (Noel Houck, Susan M. Gass); "Natural Speech Act Data versus Written Questionnaire Data: How Data Collection Method Affects Speech Act Performance" (Leslie M. Beebe,…

  4. Border Security, Economic Opportunity, and Immigration Modernization Act

    THOMAS, 113th Congress

    Rep. Garcia, Joe [D-FL-26

    2013-10-02

    03/26/2014 Motion to Discharge Committee filed by Mr. Garcia. Petition No: 113-9. (Discharge petition text with signatures.) (All Actions) Notes: On 3/26/2014, a motion was filed to discharge the Committees on the Judiciary, Foreign Affairs, Homeland Security, Ways and Means, Armed Services, Natural Resources, Agriculture, Education and the Workforce, Energy and Commerce, Oversight and Government Reform, the Budget, Science... Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  5. Provisions of the Food Security Act of 1985. Agricultural Information Bulletin Number 498.

    ERIC Educational Resources Information Center

    Glaser, Lewrene K.

    This report summarizes the 18 titles of the Food Security Act of 1985 and compares it with previous legislation where applicable. It describes the act's provisions for dairy; wool and mohair; wheat; feed grains; cotton; rice; peanuts; soybeans; sugar; other general commodity provisions; trade; conservation; credit; agricultural research,…

  6. 78 FR 14403 - Alabama Metal Coil Securement Act; Petition for Determination of Preemption

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-05

    ... System (FDMS) published in the Federal Register on December 29, 2010 (75 FR 82132). Background The Metal... Register on November 23, 2011 (76 FR 72495) seeking comment on whether the Act is preempted by Federal law... Federal Motor Carrier Safety Administration Alabama Metal Coil Securement Act; Petition for...

  7. 78 FR 46256 - Security Program, Report of Suspected Crimes, Suspicious Transactions, Catastrophic Acts and Bank...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-31

    ... From the Federal Register Online via the Government Publishing Office NATIONAL CREDIT UNION ADMINISTRATION 12 CFR Part 748 Security Program, Report of Suspected Crimes, Suspicious Transactions, Catastrophic Acts and Bank Secrecy Act Compliance CFR Correction In Title 12 of the Code of Federal...

  8. 75 FR 6231 - Securities Act of 1933; Securities Exchange Act of 1934; Order Regarding Review of FASB...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-08

    ... statement concluding that the Financial Accounting Standards Board (``FASB'') and its parent organization, the Financial Accounting Foundation (``FAF''), satisfied the criteria for an accounting standard setting body under the Act, and recognizing the FASB's financial accounting and reporting standards...

  9. A new image representation for compact and secure communication

    SciTech Connect

    Prasad, Lakshman; Skourikhine, A. N.

    2004-01-01

    In many areas of nuclear materials management there is a need for communication, archival, and retrieval of annotated image data between heterogeneous platforms and devices to effectively implement safety, security, and safeguards of nuclear materials. Current image formats such as JPEG are not ideally suited in such scenarios as they are not scalable to different viewing formats, and do not provide a high-level representation of images that facilitate automatic object/change detection or annotation. The new Scalable Vector Graphics (SVG) open standard for representing graphical information, recommended by the World Wide Web Consortium (W3C) is designed to address issues of image scalability, portability, and annotation. However, until now there has been no viable technology to efficiently field images of high visual quality under this standard. Recently, LANL has developed a vectorized image representation that is compatible with the SVG standard and preserves visual quality. This is based on a new geometric framework for characterizing complex features in real-world imagery that incorporates perceptual principles of processing visual information known from cognitive psychology and vision science, to obtain a polygonal image representation of high fidelity. This representation can take advantage of all textual compression and encryption routines unavailable to other image formats. Moreover, this vectorized image representation can be exploited to facilitate automated object recognition that can reduce time required for data review. The objects/features of interest in these vectorized images can be annotated via animated graphics to facilitate quick and easy display and comprehension of processed image content.

  10. 77 FR 70792 - Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-27

    ... Administration-009 General Legal Records (August 18, 2003, 68 FR 49496), which was written to assist attorneys in... Security/ ALL-017 General Legal Records (November 23, 2011, 76 FR 72428) to cover its legal activities.../Transportation Security Administration (TSA)-009 General Legal Records (August 18, 2003, 68 FR 49496), which...

  11. DICOM image secure communications with Internet protocols IPv6 and IPv4.

    PubMed

    Zhang, Jianguo; Yu, Fenghai; Sun, Jianyong; Yang, Yuanyuan; Liang, Chenwen

    2007-01-01

    Image-data transmission from one site to another through public network is usually characterized in term of privacy, authenticity, and integrity. In this paper, we first describe a general scenario about how image is delivered from one site to another through a wide-area network (WAN) with security features of data privacy, integrity, and authenticity. Second, we give the common implementation method of the digital imaging and communication in medicine (DICOM) image communication software library with IPv6/IPv4 for high-speed broadband Internet by using open-source software. Third, we discuss two major security-transmission methods, the IP security (IPSec) and the secure-socket layer (SSL) or transport-layer security (TLS), being used currently in medical-image-data communication with privacy support. Fourth, we describe a test schema of multiple-modality DICOM-image communications through TCP/IPv4 and TCP/IPv6 with different security methods, different security algorithms, and operating systems, and evaluate the test results. We found that there are tradeoff factors between choosing the IPsec and the SSL/TLS-based security implementation of IPv6/IPv4 protocols. If the WAN networks only use IPv6 such as in high-speed broadband Internet, the choice is IPsec-based security. If the networks are IPv4 or the combination of IPv6 and IPv4, it is better to use SSL/TLS security. The Linux platform has more security algorithms implemented than the Windows (XP) platform, and can achieve better performance in most experiments of IPv6 and IPv4-based DICOM-image communications. In teleradiology or enterprise-PACS applications, the Linux operating system may be the better choice as peer security gateways for both the IPsec and the SSL/TLS-based secure DICOM communications cross public networks. PMID:17249405

  12. Secured Optical Communications Using Quantum Entangled Two-Photon Transparency Modulation

    NASA Technical Reports Server (NTRS)

    Kojima, Jun (Inventor); Nguyen, Quang-Viet (Inventor); Lekki, John (Inventor)

    2015-01-01

    A system and method is disclosed wherein optical signals are coded in a transmitter by tuning or modulating the interbeam delay time (which modulates the fourth-order coherence) between pairs of entangled photons. The photon pairs are either absorbed or not absorbed (transparent) by an atomic or molecular fluorescer in a receiver, depending on the inter-beam delay that is introduced in the entangled photon pairs. Upon the absorption, corresponding fluorescent optical emissions follow at a certain wavelength, which are then detected by a photon detector. The advantage of the disclosed system is that it eliminates a need of a coincidence counter to realize the entanglement-based secure optical communications because the absorber acts as a coincidence counter for entangled photon pairs.

  13. 17 CFR 230.168 - Exemption from sections 2(a)(10) and 5(c) of the Act for certain communications of regularly...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... Form F-3 (referenced in 17 CFR 239.33 of this chapter); and (iii) Either: (A) Has its equity securities...)(10) and 5(c) of the Act for certain communications of regularly released factual business information... factual business information and forward-looking information. Preliminary Notes to § 230.168. 1....

  14. 17 CFR 230.168 - Exemption from sections 2(a)(10) and 5(c) of the Act for certain communications of regularly...

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... Form F-3 (referenced in 17 CFR 239.33 of this chapter); and (iii) Either: (A) Has its equity securities...)(10) and 5(c) of the Act for certain communications of regularly released factual business information... factual business information and forward-looking information. Preliminary Notes to § 230.168. 1....

  15. 17 CFR 230.168 - Exemption from sections 2(a)(10) and 5(c) of the Act for certain communications of regularly...

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... Form F-3 (referenced in 17 CFR 239.33 of this chapter); and (iii) Either: (A) Has its equity securities...)(10) and 5(c) of the Act for certain communications of regularly released factual business information... factual business information and forward-looking information. Preliminary Notes to § 230.168. 1....

  16. Secure multi-party communication with quantum key distribution managed by trusted authority

    DOEpatents

    Hughes, Richard John; Nordholt, Jane Elizabeth; Peterson, Charles Glen

    2015-01-06

    Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.

  17. Secure multi-party communication with quantum key distribution managed by trusted authority

    DOEpatents

    Nordholt, Jane Elizabeth; Hughes, Richard John; Peterson, Charles Glen

    2013-07-09

    Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.

  18. Thermal noise informatics: totally secure communication via a wire, zero-power communication, and thermal noise driven computing

    NASA Astrophysics Data System (ADS)

    Kish, Laszlo B.; Mingesz, Robert; Gingl, Zoltan

    2007-06-01

    Very recently, it has been shown that Gaussian thermal noise and its artificial versions (Johnson-like noises) can be utilized as an information carrier with peculiar properties therefore it may be proper to call this topic Thermal Noise Informatics. Zero Power (Stealth) Communication, Thermal Noise Driven Computing, and Totally Secure Classical Communication are relevant examples. In this paper, while we will briefly describe the first and the second subjects, we shall focus on the third subject, the secure classical communication via wire. This way of secure telecommunication utilizes the properties of Johnson(-like) noise and those of a simple Kirchhoff's loop. The communicator is unconditionally secure at the conceptual (circuit theoretical) level and this property is (so far) unique in communication systems based on classical physics. The communicator is superior to quantum alternatives in all known aspects, except the need of using a wire. In the idealized system, the eavesdropper can extract zero bit of information without getting uncovered. The scheme is naturally protected against the man-in-the-middle attack. The communication can take place also via currently used power lines or phone (wire) lines and it is not only a point-to-point communication like quantum channels but network-ready. We report that a pair of Kirchhoff-Loop-Johnson(-like)-Noise communicators, which is able to work over variable ranges, was designed and built. Tests have been carried out on a model-line with ranges beyond the ranges of any known direct quantum communication channel and they indicate unrivalled signal fidelity and security performance. This simple device has single-wire secure key generation/sharing rates of 0.1, 1, 10, and 100 bit/second for copper wires with diameters/ranges of 21 mm / 2000 km, 7 mm / 200 km, 2.3 mm / 20 km, and 0.7 mm / 2 km, respectively and it performs with 0.02% raw-bit error rate (99.98 % fidelity). The raw-bit security of this practical system

  19. 48 CFR 1552.235-78 - Data Security for Toxic Substances Control Act Confidential Business Information (DEC 1997).

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 6 2013-10-01 2013-10-01 false Data Security for Toxic... CONTRACT CLAUSES Texts of Provisions and Clauses 1552.235-78 Data Security for Toxic Substances Control Act...: Data Security for Toxic Substances Control Act Confidential Business Information (DEC 1997)...

  20. 48 CFR 1552.235-78 - Data Security for Toxic Substances Control Act Confidential Business Information (DEC 1997).

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 6 2011-10-01 2011-10-01 false Data Security for Toxic... CONTRACT CLAUSES Texts of Provisions and Clauses 1552.235-78 Data Security for Toxic Substances Control Act...: Data Security for Toxic Substances Control Act Confidential Business Information (DEC 1997)...

  1. 48 CFR 1552.235-78 - Data Security for Toxic Substances Control Act Confidential Business Information (DEC 1997).

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 6 2014-10-01 2014-10-01 false Data Security for Toxic... CONTRACT CLAUSES Texts of Provisions and Clauses 1552.235-78 Data Security for Toxic Substances Control Act...: Data Security for Toxic Substances Control Act Confidential Business Information (DEC 1997)...

  2. 48 CFR 1552.235-78 - Data Security for Toxic Substances Control Act Confidential Business Information (DEC 1997).

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 6 2012-10-01 2012-10-01 false Data Security for Toxic... CONTRACT CLAUSES Texts of Provisions and Clauses 1552.235-78 Data Security for Toxic Substances Control Act...: Data Security for Toxic Substances Control Act Confidential Business Information (DEC 1997)...

  3. 48 CFR 1552.235-78 - Data Security for Toxic Substances Control Act Confidential Business Information (DEC 1997).

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Data Security for Toxic... CONTRACT CLAUSES Texts of Provisions and Clauses 1552.235-78 Data Security for Toxic Substances Control Act...: Data Security for Toxic Substances Control Act Confidential Business Information (DEC 1997)...

  4. 76 FR 11533 - Securities Exchange Act of 1934; In the Matter of Chicago Board Options Exchange, Incorporated...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-02

    .... 60147 (June 19, 2009), 74 FR 30651 (June 26, 2009). \\2\\ See Securities Exchange Act Release No. 60584 (August 28, 2009), 74 FR 45663 (September 3, 2009). \\3\\ 17 CFR Sec. 201.431(e). \\4\\ See Securities... Securities Exchange Act Release No. 62523 (July 16, 2010), 75 FR 43211 (July 23, 2010). \\7\\ See letter...

  5. Security for Telecommuting and Broadband Communications: Recommendations of the National Institute of Standards and Technology

    NASA Astrophysics Data System (ADS)

    Kuhn, D. R.; Tracy, Miles C.; Frankel, Sheila E.

    2002-08-01

    This document is intended to assist those responsible - users, system administrators, and management - for telecommuting security, by providing introductory information about broadband communication security and policy, security of home office systems, and considerations for system administrators in the central office. It addresses concepts relating to the selection, deployment, and management of broadband communications for a telecommuting user. This document is not intended to provide a mandatory framework for telecommuting or home office broadband communication environments, but rather to present suggested approaches to the topic.

  6. 75 FR 7979 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL-027 The...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-23

    ...: The History of the Department of Homeland Security System of Records (69 FR 56781, September 22, 2004... of Homeland Security/ALL-027 The History of the Department of Homeland Security System of Records... Act of 1974 for the Department of Homeland Security/ALL-027 The History of the Department of...

  7. 75 FR 8092 - Privacy Act of 1974; Department of Homeland Security/ALL-027 The History of the Department of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-23

    ... Security System of Records (69 FR 56781, September 22, 2004) for the collection and maintenance of records... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security/ALL--027 The History..., Department of Homeland Security-2004- 0004 Oral History Program: The History of the Department of...

  8. 76 FR 8755 - Privacy Act of 1974; Department of Homeland Security/ALL-032 Official Passport Application and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-15

    ... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security/ALL--032 Official... titled, ``Department of Homeland Security/ ALL--032 Official Passport Application and Maintenance Records..., Privacy Office, Department of Homeland Security, Washington, DC 20528. Instructions: All...

  9. 77 FR 70792 - Privacy Act of 1974; Department of Homeland Security/ALL-004 General Information Technology...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-27

    ... DHS/ALL-004 General Information Technology Access Account Records System of Records (73 FR 28139, May... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security/ALL-004 General... Homeland Security system of records notice titled, Department of Homeland Security/ALL-004...

  10. 76 FR 72428 - Privacy Act of 1974; Department of Homeland Security/ALL-017 General Legal Records System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-23

    ... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security/ALL--017 General... Security/ ALL--017 General Legal Records System of Records.'' This system will assist attorneys in..., Department of Homeland Security, Washington, DC 20528. Instructions: All submissions received must...

  11. Security of electronic mental health communication and record-keeping in the digital age.

    PubMed

    Elhai, Jon D; Frueh, B Christopher

    2016-02-01

    The mental health field has seen a trend in recent years of the increased use of information technology, including mobile phones, tablets, and laptop computers, to facilitate clinical treatment delivery to individual patients and for record keeping. However, little attention has been paid to ensuring that electronic communication with patients is private and secure. This is despite potentially deleterious consequences of a data breach, which are reported in the news media very frequently in modern times. In this article, we present typical security concerns associated with using technology in clinical services or research. We also discuss enhancing the privacy and security of electronic communication with clinical patients and research participants. We offer practical, easy-to-use software application solutions for clinicians and researchers to secure patient communication and records. We discuss such issues as using encrypted wireless networks, secure e-mail, encrypted messaging and videoconferencing, privacy on social networks, and others. PMID:26301860

  12. 75 FR 55290 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL-031...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-10

    ... of Intelligence and Analysis, Department of Homeland Security, Washington, DC 20528. For privacy... Intelligence Reform and Terrorism Prevention Act of 2004 (IRTPA), as amended. The NSI establishes a nationwide... to official DHS national security, law enforcement, immigration, intelligence activities,...

  13. Secure communication of medical information using mobile agents.

    PubMed

    Nikooghadam, Morteza; Zakerolhosseini, Ali

    2012-12-01

    Recently several efficient schemes are proposed to provide security of e-medicine systems. Almost all of these schemes have tried to achieve the highest security level in transmission of patients' medical information to medical institutions through a heterogeneous network like Internet. In this paper, we explain the insecurity of these schemes against "man-in-the-middle" attack. Furthermore, a dynamic mobile agent system based on hybrid cryptosystem is proposed that is both secure and also efficient in computation cost. Analyzing the security criteria confirms suitability of the proposed scheme for e-medicine systems. PMID:22569875

  14. 77 FR 70795 - Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-27

    ... Administration-012 Transportation Worker Identification Credentialing System (September 24, 2004, 69 FR 57348..., 2010, 75 FR 28046), which covers the Security Threat Assessment process associated with the... Credentialing (TWIC) System (September 24, 2004, 69 FR 57348), which was written to cover the Prototype Phase...

  15. 78 FR 55270 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-DHS...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-10

    ... CFR Sec. 1560. \\1\\ 77 FR 69491 (Nov. 19, 2012). Under sec. 4012(a)(1)-(2) of the Intelligence Reform.... \\4\\ 73 FR 64018 (Oct. 28, 2008). TSA established the Secure Flight system of records and published...\\ Information collection falls under OMB Control Number 1652-0046. \\5\\ 72 FR 48392. \\6\\ 72 FR 63711. \\7\\ 77...

  16. 78 FR 73868 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-DHS...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-09

    ... August 4, 2006 in 71 FR 44223. This updated system will be included in DHS' inventory of record systems.... Electronic access is limited by computer security measures that are strictly enforced. TSA file areas are... rule published on August 4, 2006 in 71 FR 44223. Dated: November 21, 2013. Karen L. Neuman...

  17. 75 FR 18867 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-011...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-13

    ... Security Intelligence Service (TSIS) Operations Files System of Records (69 FR 71828, December 10, 2004...(j)(2), (k)(1), (k)(2) and (k)(5) as reflected in the final rule published on August 4, 2006 in 71 FR...)(2), and (k)(5) as reflected in the final rule published on August 4, 2006, in 71 FR 44223....

  18. 75 FR 28046 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-002...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-19

    ... Transportation Security Threat Assessment System of Records (70 FR 33383, November 8, 2005). TSA's mission is to... systems as reflected in the final rule published on June 25, 2004 in 69 FR 35536. The information is... Investigation--009 Fingerprint Identification Records System (72 FR 3410, January 1, 2007). ] Exemptions...

  19. Reply to 'Comment on 'Secure direct communication with a quantum one-time-pad''

    SciTech Connect

    Deng Fuguo; Long Guilu

    2005-07-15

    We reply to the preceding comment which focused on whether there exists a quantum privacy amplification technique for purifying the unknown single-photon states transmitted. In this Reply, we will show that quantum privacy amplification is principally possible, and a specific scheme for direct communication protocol based on single photons has been constructed and will be published elsewhere. Then the secure direct quantum communication is secure against the attack strategy in the preceding comment by using quantum privacy amplification directly.

  20. Eavesdropping on secure deterministic communication with qubits through photon-number-splitting attacks

    SciTech Connect

    Lin Song; Wen Qiaoyan; Gao Fei; Zhu Fuchen

    2009-05-15

    A collective photon-number-splitting attack strategy is proposed, which combines photon-number-splitting attack with an unambiguous set discrimination of quantum state. Verified by this attack strategy, it is shown that a two-way quantum secure direct communication protocol with qubits is insecure in real circumstance. Finally, we present a possible improved version of this kind of quantum secure direct communication protocol.

  1. 6 CFR Appendix A to Part 5 - FOIA/Privacy Act Offices of the Department of Homeland Security

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 6 Domestic Security 1 2012-01-01 2012-01-01 false FOIA/Privacy Act Offices of the Department of Homeland Security A Appendix A to Part 5 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY DISCLOSURE OF RECORDS AND INFORMATION Pt. 5, App. A Appendix A to Part 5—FOIA/Privacy Act Offices of the Department of Homeland...

  2. A secure communication using cascade chaotic computing systems on clinical decision support.

    PubMed

    Koksal, Ahmet Sertol; Er, Orhan; Evirgen, Hayrettin; Yumusak, Nejat

    2016-06-01

    Clinical decision support systems (C-DSS) provide supportive tools to the expert for the determination of the disease. Today, many of the support systems, which have been developed for a better and more accurate diagnosis, have reached a dynamic structure due to artificial intelligence techniques. However, in cases when important diagnosis studies should be performed in secret, a secure communication system is required. In this study, secure communication of a DSS is examined through a developed double layer chaotic communication system. The developed communication system consists of four main parts: random number generator, cascade chaotic calculation layer, PCM, and logical mixer layers. Thanks to this system, important patient data created by DSS will be conveyed to the center through a secure communication line. PMID:25992507

  3. 17 CFR 240.12a-11 - Exemption of security-based swaps sold in reliance on Securities Act of 1933 Rule 240 (§ 230.240...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 CFR part 240 or modifying it as appropriate. General ... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Exemption of security-based swaps sold in reliance on Securities Act of 1933 Rule 240 (§ 230.240) from section 12(a) of the...

  4. Telecommunications Policy Research Conference. Computer and Communications Security Section. Papers.

    ERIC Educational Resources Information Center

    Telecommunications Policy Research Conference, Inc., Washington, DC.

    In his paper, "European Needs and Attitudes towards Information Security," Richard I. Polis notes that the needs for security in computer systems, telecommunications, and media are rather uniform throughout Western Europe, and are seen as being significantly different from the needs in the United States. Recognition of these needs is, however,…

  5. Advanced Communications Technology Satellite (ACTS): Design and on-orbit performance measurements

    NASA Technical Reports Server (NTRS)

    Gargione, F.; Acosta, R.; Coney, T.; Krawczyk, R.

    1995-01-01

    The Advanced Communications Technology Satellite (ACTS), developed and built by Lockheed Martin Astro space for the NASA Lewis Research Center, was launched in September 1993 on the shuttle STS 51 mission. ACTS is a digital experimental communications test bed that incorporates gigahertz bandwidth transponders operating at Ka band, hopping spot beams, on-board storage and switching, and dynamic rain fade compensation. This paper describes the ACTS enabling technologies, the design of the communications payload, the constraints imposed on the spacecraft bus, and the measurements conducted to verify the performance of the system in orbit.

  6. Method of Performance-Aware Security of Unicast Communication in Hybrid Satellite Networks

    NASA Technical Reports Server (NTRS)

    Roy-Chowdhury, Ayan (Inventor); Baras, John S. (Inventor)

    2014-01-01

    A method and apparatus utilizes Layered IPSEC (LES) protocol as an alternative to IPSEC for network-layer security including a modification to the Internet Key Exchange protocol. For application-level security of web browsing with acceptable end-to-end delay, the Dual-mode SSL protocol (DSSL) is used instead of SSL. The LES and DSSL protocols achieve desired end-to-end communication security while allowing the TCP and HTTP proxy servers to function correctly.

  7. Building a gateway with open source software for secure-DICOM communication over insecure networks

    NASA Astrophysics Data System (ADS)

    Emmel, Dirk; Ricke, Jens; Stohlmann, Lutz; Haderer, Alexander; Felix, Roland

    2002-05-01

    For Teleradiology the exchange of DICOM-images is needed for several purposes. Existing solutions often don't consider about the needs for data security and data privacy. Communication is done without any encryption over insecure networks or with encryption using proprietary solutions, which reduces the data communication possibilities to partners with the same equipment. Our goal was to build a gateway, which offers a transparent solution for secure DICOM-communication in a heterogeneous environment We developed a PC-based gateway system with DICOM-communication to the in-house network and secure DICOM communication for the communication over the insecure network. One gateway installed at each location is responsible for encryption/decryption. The sender just transfers the image data over the DICOM protocol to the local gateway. The gateway forwards the data to the gateway on the destination site using the secure DICOM protocol, which is part of the DICOM standard. The receiving gateway forwards the image data to the final destination again using the DICOM-Protocol. The gateway is based on Open Source software and runs under several operating systems. Our experience shows a reliable solution, which solves security issues for DICOM communication of image data and integrates seamless into a heterogeneous DICOM environment.

  8. Robust Networking Architecture and Secure Communication Scheme for Heterogeneous Wireless Sensor Networks

    ERIC Educational Resources Information Center

    McNeal, McKenzie, III.

    2012-01-01

    Current networking architectures and communication protocols used for Wireless Sensor Networks (WSNs) have been designed to be energy efficient, low latency, and long network lifetime. One major issue that must be addressed is the security in data communication. Due to the limited capabilities of low cost and small sized sensor nodes, designing…

  9. Education Issues Raised by S.744: The Border Security, Economic Opportunity, and Immigration Modernization Act

    ERIC Educational Resources Information Center

    Murphy, Garrett

    2014-01-01

    This brief report summarizes the requirements for undocumented immigrants set forth by the Border Security, Economic Opportunity, and Immigration Modernization Act (S.744). Assuming that S.744 will move forward in Congress, the report also examines issues having to do with certain language, civics and government, and education/training provisions…

  10. 76 FR 60067 - Privacy Act of 1974; Department of Homeland Security Federal Emergency Management Agency-012...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-28

    .... 314; The Homeland Security Act of 2002, as amended; the Intelligence Reform and Terrorism Prevention..., law enforcement, immigration, intelligence, or other functions consistent with the routine uses set...; Name (first, middle, and last); Address (number, street, apartment, city, and state); Age; Sex;...

  11. 76 FR 12609 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Office of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-08

    ... established system will be included in DHS's inventory of record systems. The NOC and SWO tracking functions... Security Operations Center Database (April 18, 2005, 70 FR 20061). The Privacy Act embodies fair... under the control of an agency from which information is retrieved by the name of the individual or...

  12. 77 FR 74913 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-18

    ... ADMINISTRATION Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA... October 8, 1999 (64 FR 54930), as amended on May 3, 2000 (65 FR 25775). We will match the OPM data with data in our Medicare Database (MDB), SOR 60-0321, last published at 71 FR 42159 (July 25, 2006)....

  13. 77 FR 54943 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-06

    ... ADMINISTRATION Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA..., Education, and Vocational Rehabilitation and Employment Records-VA'' (58VA21/22/28), published at 74 FR... FR 42159 (July 25, 2006). 2. Number of Records VA's data file will consist of approximately...

  14. 75 FR 75520 - Order Extending Temporary Conditional Exemptions Under The Securities Exchange Act of 1934 in...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-03

    ... Release Nos. 60372 (Jul. 23, 2009), 74 FR 37748 (Jul. 29, 2009) and 61973 (Apr. 23, 2010), 75 FR 22656...); Securities Exchange Act Release Nos. 60373 (Jul. 23, 2009), 74 FR 37740 (Jul. 29, 2009) and 61975 (Apr. 23, 2010), 75 FR 22641 (Apr. 29, 2010) (temporary exemptions in connection with CDS clearing by...

  15. 75 FR 50843 - 75th Anniversary of the Social Security Act

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-18

    ... From the Federal Register Online via the Government Publishing Office #0; #0; #0; Presidential Documents #0; #0; #0;#0;Federal Register / Vol. 75, No. 159 / Wednesday, August 18, 2010 / Presidential Documents#0;#0; #0; #0;Title 3-- #0;The President ] Proclamation 8546 of August 13, 2010 75th Anniversary of the Social Security Act By the President of the United States...

  16. 75 FR 39273 - Energy Independence and Security Act (Pub. L. 110-140)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-08

    ...In 2007, the Energy Independence and Security Act (Pub. L. 110-140) directed the United States Geological Survey (USGS) to conduct a national assessment of potential geologic storage resources for carbon dioxide (CO2). The first requirement stipulated in the legislation was to develop a methodology to estimate storage potential that could be applied uniformly to geologic formations......

  17. P.L. 110-140, "Energy Independence and Security Act of 2007" (2007)

    SciTech Connect

    2007-12-13

    An act to move the United States toward greater energy independence and security, to increase the production of clean renewable fuels, to protect consumers, to increase the efficiency of products, buildings, and vehicles, to promote research on and deploy greenhouse gas capture and storage options, and to improve the energy performance of the Federal Government, and for other purposes.

  18. Public key suppression and recovery using a PANDA ring resonator for high security communication

    NASA Astrophysics Data System (ADS)

    Juleang, Pakorn; Phongsanam, Prapas; Mitatha, Somsak; Yupapin, Preecha P.

    2011-03-01

    An interesting security technique that uses the dark-bright soliton conversion control within the microring resonator is proposed. The obtained outputs for a dark-bright soliton dynamic state can be controlled and used to form the public key suppression for communication security application. However, a good design should be possible to be fabricated; therefore, by using the parameters based on the practical device parameters, the simulation results obtained have shown that the proposed system can indeed be achieved. The public key suppression and public key recovery can be used in a highly secure communication system and has potential applications in optical cryptography.

  19. 75 FR 18863 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-006...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-13

    ... records notice titled, DHS/TSA-006 Correspondence Matters Tracking System Records (CMTR) (68 FR 49496... the Federal Register on June 25, 2004 (69 FR 35536). Consistent with the Privacy Act, information... (69 FR 35536). However, TSA will consider individual requests to determine whether or not...

  20. Entanglement-based quantum communication secured by nonlocal dispersion cancellation

    NASA Astrophysics Data System (ADS)

    Lee, Catherine; Zhang, Zheshen; Steinbrecher, Gregory R.; Zhou, Hongchao; Mower, Jacob; Zhong, Tian; Wang, Ligong; Hu, Xiaolong; Horansky, Robert D.; Verma, Varun B.; Lita, Adriana E.; Mirin, Richard P.; Marsili, Francesco; Shaw, Matthew D.; Nam, Sae Woo; Wornell, Gregory W.; Wong, Franco N. C.; Shapiro, Jeffrey H.; Englund, Dirk

    2014-12-01

    Quantum key distribution (QKD) enables participants to exchange secret information over long distances with unconditional security. However, the performance of today's QKD systems is subject to hardware limitations, such as those of available nonclassical-light sources and single-photon detectors. By encoding photons in high-dimensional states, the rate of generating secure information under these technical constraints can be maximized. Here, we demonstrate a complete time-energy entanglement-based QKD system with proven security against the broad class of arbitrary collective attacks. The security of the system is based on nonlocal dispersion cancellation between two time-energy entangled photons. This resource-efficient QKD system is implemented at telecommunications wavelength, is suitable for optical fiber and free-space links, and is compatible with wavelength-division multiplexing.

  1. Children’s Security in the Context of Family Instability and Maternal Communications

    PubMed Central

    Winter, Marcia A.; Davies, Patrick T.; Cummings, E. Mark

    2010-01-01

    This multi-method study examined the association between family instability and children’s internal representations of security in the family system within the context of maternal communications about disruptive family events. Participants included 224 kindergarten children (100 boys and 124 girls) and their parents. Parents reported on the frequency of unstable family events, mothers reported their patterns of communication to children following disruptive events, and children completed a story-stem battery to assess their internal representations of family security. Consistent with predictions, heightened family instability was associated with less security in child representations. The implication of these results for notions of children’s security in the family system, including exploratory findings on the protective role of maternal communications for children’s representations, are discussed. PMID:20689722

  2. Communicative Acts of Children with Autism Spectrum Disorders in the Second Year of Life

    PubMed Central

    Shumway, Stacy; Wetherby, Amy M.

    2009-01-01

    Purpose This study examined the communicative profiles of children with autism spectrum disorders (ASD) in the second year of life. Method Communicative acts were examined in 125 children 18 to 24 months of age: 50 later diagnosed with ASD; 25 with developmental delays (DD); and 50 with typical development (TD). Precise measures of rate, functions, and means of communication were obtained through systematic observation of videotaped Behavior Samples from the Communication and Symbolic Behavior Scales Developmental Profile (Wetherby & Prizant, 2002). Results Children with ASD communicated at a significantly lower rate than children with DD and TD. The ASD group used a significantly lower proportion of acts for joint attention and a significantly lower proportion of deictic gestures with a reliance on more primitive gestures compared to DD and TD. Children with ASD who did communicate for joint attention were as likely as other children to coordinate vocalizations, eye gaze, and gestures. Rate of communicative acts and joint attention were the strongest predictors of verbal outcome at age 3. Conclusions By 18 to 24 months of age, children later diagnosed with ASD showed a unique profile of communication, with core deficits in communication rate, joint attention, and communicative gestures. PMID:19635941

  3. Asynchronous error-correcting secure communication scheme based on fractional-order shifting chaotic system

    NASA Astrophysics Data System (ADS)

    Chao, Luo

    2015-11-01

    In this paper, a novel digital secure communication scheme is firstly proposed. Different from the usual secure communication schemes based on chaotic synchronization, the proposed scheme employs asynchronous communication which avoids the weakness of synchronous systems and is susceptible to environmental interference. Moreover, as to the transmission errors and data loss in the process of communication, the proposed scheme has the ability to be error-checking and error-correcting in real time. In order to guarantee security, the fractional-order complex chaotic system with the shifting of order is utilized to modulate the transmitted signal, which has high nonlinearity and complexity in both frequency and time domains. The corresponding numerical simulations demonstrate the effectiveness and feasibility of the scheme.

  4. A laser communication experiment utilizing the ACT satellite and an airborne laser transceiver

    NASA Technical Reports Server (NTRS)

    Provencher, C.; Spence, Rod

    1988-01-01

    The Advanced Communications Technology Satellite (ACTS) will carry a laser communications transmitter package in order to attempt the experimental reception of signals transmitted from earth orbit. The ACTS laser package includes both a heterodyne transmitter and a direct-detection transmitter. The laser receiver will be installed in an aircraft that is fitted with the requisite signal window. The anticipated capability of this signal detector is noted.

  5. Quantum Secure Direct Communication in a noisy environment: Theory and Experiment

    NASA Astrophysics Data System (ADS)

    Long, Gui Lu

    Quantum communication holds promise for absolutely security in secret message transmission. Quantum secure direct communication (QSDC) is an important branch of the quantum communication in which secret messages are sent directly over a quantum channel with security[Phys. Rev. A 65 , 032302 (2002)]. QSDC offers higher security and is instantaneous in communication, and is a great improvement to the classical communication mode. It is also a powerful basic quantum communication primitive for constructing many other quantum communication tasks such as quantum bidding, quantum signature and quantum dialogue and so on. Since the first QSDC protocol proposed in 2000, it has become one of the extensive research focuses. In this talk, the basic ideas of QSDC will be reviewed, and major QSDC protocols will be described, such as the efficient-QSDC protocol, the two-step QSDC protocol, the one-time-pad QSDC protocol, the high-dimensional QSDC protocol and so on. Experimental progress is also developing steadily, and will also be reviewed. In particular, the quantum one-time-pad QSDC protocol has recently been successfully demonstrated experimentally[arXiv:1503.00451]. Work supported by China National Natural Science Foundation, the Ministry of Science and Technology of China.

  6. A revised controlled deterministic secure quantum communication with five-photon entangled state

    NASA Astrophysics Data System (ADS)

    Xiu, Xiao-Ming; Dong, Li; Gao, Ya-Jun; Chi, Feng; Ren, Yuan-Peng; Liu, Hui-Wei

    2010-01-01

    A revised controlled deterministic secure quantum communication protocol using five-photon entangled state is proposed. It amends the security loopholes pointed by Qin et al. in [S.J. Qin, Q.Y. Wen, L.M. Meng, F.C. Zhu, Opt. Commun. 282 (2009) 2656] in the original protocol proposed by Xiu et al. in [X.M. Xiu, L. Dong, Y.J. Gao, F. Chi, Opt. Commun. 282 (2009) 333]. The security loopholes are solved by using order rearrangement of transmission photons and two-step security test.

  7. Toward a semantics for an agent communications language based on speech-acts

    SciTech Connect

    Smith, I.A.; Cohen, P.R.

    1996-12-31

    Systems based on distributed agent architectures require an agent communications language having a clearly defined semantics. This paper demonstrates that a semantics for an agent communications language can be founded on the premise that agents are building, maintaining, and disbanding teams through their performance of communicative acts. This view requires that definitions of basic communicative acts, such as requesting, be recast in terms of the formation of a joint intention - a mental state that has been suggested underlies team behavior. To illustrate these points, a semantics is developed for a number of communication actions that can form and dissolve teams. It is then demonstrated how much of the structure of popular finite-state dialogue models, such as Winograd and Flores` basic conversation for action, follows as a consequence of the logical relationships that are created by the redefined communicative actions.

  8. 47 CFR 80.305 - Watch requirements of the Communications Act and the Safety Convention.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... and the Safety Convention. 80.305 Section 80.305 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES STATIONS IN THE MARITIME SERVICES Safety Watch Requirements and Procedures Ship Station Safety Watches § 80.305 Watch requirements of the Communications Act and the...

  9. 47 CFR 80.305 - Watch requirements of the Communications Act and the Safety Convention.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 5 2011-10-01 2011-10-01 false Watch requirements of the Communications Act and the Safety Convention. 80.305 Section 80.305 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES STATIONS IN THE MARITIME SERVICES Safety Watch Requirements and Procedures Ship Station Safety Watches...

  10. 47 CFR 80.305 - Watch requirements of the Communications Act and the Safety Convention.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Watch requirements of the Communications Act and the Safety Convention. 80.305 Section 80.305 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES STATIONS IN THE MARITIME SERVICES Safety Watch Requirements and Procedures Ship Station Safety Watches...

  11. 47 CFR 80.305 - Watch requirements of the Communications Act and the Safety Convention.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 5 2014-10-01 2014-10-01 false Watch requirements of the Communications Act and the Safety Convention. 80.305 Section 80.305 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES STATIONS IN THE MARITIME SERVICES Safety Watch Requirements and Procedures Ship Station Safety Watches...

  12. 47 CFR 80.305 - Watch requirements of the Communications Act and the Safety Convention.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 5 2012-10-01 2012-10-01 false Watch requirements of the Communications Act and the Safety Convention. 80.305 Section 80.305 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES STATIONS IN THE MARITIME SERVICES Safety Watch Requirements and Procedures Ship Station Safety Watches...

  13. Communicative Acts of Children with Autism Spectrum Disorders in the Second Year of Life

    ERIC Educational Resources Information Center

    Shumway, Stacy; Wetherby, Amy M.

    2009-01-01

    Purpose: To examine the communicative profiles of children with autism spectrum disorders (ASD) in the second year of life. Method: Communicative acts were examined in 125 children 18 to 24 months of age: 50 later diagnosed with ASD; 25 with developmental delays (DD); and 50 with typical development (TD). Precise measures of rate, functions, and…

  14. Security

    ERIC Educational Resources Information Center

    Technology & Learning, 2008

    2008-01-01

    Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…

  15. Enhancing Nutrition Security via India's National Food Security Act: Using an Axe instead of a Scalpel?§

    PubMed Central

    Desai, Sonalde; Vanneman, Reeve

    2016-01-01

    In September 2013, India passed a historic National Food Security Act. This paper examines the potential impact of the two central pillars of this act - expansion of the Public Distribution System and strengthening of the Integrated Child Development Schemes – on child nutrition. Using new data from the India Human Development Survey of 2011-12, this paper shows that access to subsidized grains via PDS is not related to improved child nutrition, and while ICDS seems to be related to lower child undernutrition, it has a limited reach in spite of the universalization of the program. The paper suggests that a tiered strategy in dealing with child undernutrition that starts with the identification of undernourished children and districts and follows through with different strategies for dealing with severe, acute malnutrition, followed by a focus on moderate malnutrition, could be more effective than the existing focus on cereal distribution rooted in the NFSA. PMID:27034596

  16. High speed fault tolerant secure communication for muon chamber using FPGA based GBTx emulator

    NASA Astrophysics Data System (ADS)

    Sau, Suman; Mandal, Swagata; Saini, Jogender; Chakrabarti, Amlan; Chattopadhyay, Subhasis

    2015-12-01

    The Compressed Baryonic Matter (CBM) experiment is a part of the Facility for Antiproton and Ion Research (FAIR) in Darmstadt at the GSI. The CBM experiment will investigate the highly compressed nuclear matter using nucleus-nucleus collisions. This experiment will examine lieavy-ion collisions in fixed target geometry and will be able to measure hadrons, electrons and muons. CBM requires precise time synchronization, compact hardware, radiation tolerance, self-triggered front-end electronics, efficient data aggregation schemes and capability to handle high data rate (up to several TB/s). As a part of the implementation of read out chain of Muon Cliamber(MUCH) [1] in India, we have tried to implement FPGA based emulator of GBTx in India. GBTx is a radiation tolerant ASIC that can be used to implement multipurpose high speed bidirectional optical links for high-energy physics (HEP) experiments and is developed by CERN. GBTx will be used in highly irradiated area and more prone to be affected by multi bit error. To mitigate this effect instead of single bit error correcting RS code we have used two bit error correcting (15, 7) BCH code. It will increase the redundancy which in turn increases the reliability of the coded data. So the coded data will be less prone to be affected by noise due to radiation. The data will go from detector to PC through multiple nodes through the communication channel. The computing resources are connected to a network which can be accessed by authorized person to prevent unauthorized data access which might happen by compromising the network security. Thus data encryption is essential. In order to make the data communication secure, advanced encryption standard [2] (AES - a symmetric key cryptography) and RSA [3], [4] (asymmetric key cryptography) are used after the channel coding. We have implemented GBTx emulator on two Xilinx Kintex-7 boards (KC705). One will act as transmitter and other will act as receiver and they are connected

  17. 78 FR 40220 - Order Pursuant to Section 17A of the Securities Exchange Act of 1934 Granting Exemption From the...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-03

    ... Limited in Connection With Its Proposal To Clear Contracts Traded on the LIFFE Administration and Management Market June 27, 2013. I. Introduction Section 17A of the Securities Exchange Act of 1934... Dealers and Major Security-Based Swap Participants, Exchange Act Release No. 69490 (May 1, 2013), 78...

  18. 75 FR 11589 - Order Extending Temporary Exemptions Under the Securities Exchange Act of 1934 in Connection with...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-11

    ... Securities Exchange Act Release No. 60372 (Jul. 23, 2009), 74 FR 37748 (Jul. 29, 2009) (temporary exemptions.... 60373 (Jul. 23, 2009), 74 FR 37740 (Jul. 29, 2009) (temporary exemptions in connection with CDS clearing by Eurex Clearing AG); Securities Exchange Act Release No. 59578 (Mar. 13, 2009), 74 FR 11781...

  19. 77 FR 32709 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Department of Homeland Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-01

    ... From the Federal Register Online via the Government Publishing Office ] SOCIAL SECURITY ADMINISTRATION Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Department of Homeland Security (DHS))--Match Number 1010 AGENCY: Social Security Administration (SSA). ACTION: Notice of a renewal...

  20. 78 FR 28761 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security U.S...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-16

    ...The Department of Homeland Security is giving concurrent notice of a newly established system of records pursuant to the Privacy Act of 1974 for the ``Department of Homeland Security/U.S. Immigration and Customs Enforcement--014 Homeland Security Investigations Forensic Laboratory System of Records'' and this proposed rulemaking. In this proposed rulemaking, the Department proposes to exempt......

  1. 76 FR 41274 - Privacy Act of 1974; Department of Homeland Security/ALL-033 Reasonable Accommodations Records...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-13

    ... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security/ALL-033 Reasonable... to ] establish a new system of records titled, ``Department of Homeland Security/ALL-033 Reasonable..., Washington, DC 20528. Instructions: All submissions received must include the agency name and docket...

  2. Performance evaluation of secured DICOM image communication with next generation internet protocol IPv6

    NASA Astrophysics Data System (ADS)

    Yu, Fenghai; Zhang, Jianguo; Chen, Xiaomeng; Huang, H. K.

    2005-04-01

    Next Generation Internet (NGI) technology with new communication protocol IPv6 emerges as a potential solution for low-cost and high-speed networks for image data transmission. IPv6 is designed to solve many of the problems of the current version of IP (known as IPv4) with regard to address depletion, security, autoconfiguration, extensibility, and more. We choose CTN (Central Test Node) DICOM software developed by The Mallinckrodt Institute of Radiology to implement IPv6/IPv4 enabled DICOM communication software on different operating systems (Windows/Linux), and used this DICOM software to evaluate the performance of the IPv6/IPv4 enabled DICOM image communication with different security setting and environments. We compared the security communications of IPsec with SSL/TLS on different TCP/IP protocols (IPv6/IPv4), and find that there are some trade-offs to choose security solution between IPsec and SSL/TLS in the security implementation of IPv6/IPv4 communication networks.

  3. A laser communication experiment utilizing the ACT satellite and an airborne laser transceiver

    NASA Technical Reports Server (NTRS)

    Provencher, Charles E., Jr.; Spence, Rodney L.

    1988-01-01

    The launch of a laser communication transmitter package into geosynchronous Earth orbit onboard the Advanced Communications Technology Satellite (ACTS) will present an excellent opportunity for the experimental reception of laser communication signals transmitted from a space orbit. The ACTS laser package includes both a heterodyne transmitter (Lincoln Labs design) and a direct detection transmitter (Goddard Space Flight Center design) with both sharing some common optical components. NASA Lewis Research Center's Space Electronics Division is planning to perform a space communication experiment utilizing the GSFC direct detection laser transceiver. The laser receiver will be installed within an aircraft provided with a glass port for the reception of the signal. This paper describes the experiment and the approach to performing such an experiment. Described are the constraints placed on the NASA Lewis experiment by the performance parameters of the laser transmitter and by the ACTS spacecraft operations. The conceptual design of the receiving terminal is given; also included is the anticipated capability of the detector.

  4. A Generic Approach to Security Assured Net-Centric Communications Network Architecture for C4I Systems

    NASA Astrophysics Data System (ADS)

    Alghamdi, Abdullah S.; Quadri, Syed Amanullah; Ahmad, Iftikhar; Al-Nafjan, Khalid

    The purpose of this paper is to suggest security assured data communications architecture in net-centric defense systems based on DoDAF 2.0. This architecture provides a finite security precision of network communication within the defense network like C4I System. In this proposed network communication architecture where security is being prioritized, we propose three security mechanism levels, the authentication level, the Business Rules Repository level & Security Rules Repository level and available techniques facilitating the functionality of the levels. Security can be coerced at every stage of the data transit. By utilization of various data security measures available, each level will substantiate the security of the data in the communication chain from end to end.

  5. Patients' rights to care under Clinton's Health Security Act: the structure of reform.

    PubMed Central

    Mariner, W K

    1994-01-01

    Like most reform proposals, President Clinton's proposed Health Security Act offers universal access to care but does not significantly alter the nature of patients' legal rights to services. The act would create a system of delegated federal regulation in which the states would act like federal administrative agencies to carry out reform. To achieve uniform, universal coverage, the act would establish a form of mandatory health insurance, with federal law controlling the minimum services to which everyone would be entitled. Because there is no constitutionally protected right to health care and no independent constitutional standard for judging what insurance benefits are appropriate, the federal government would retain considerable freedom to decide what services would and would not be covered. If specific benefits are necessary for patients, they will have to be stated in the legislation that produces reform. PMID:8059899

  6. Patients' rights to care under Clinton's Health Security Act: the structure of reform.

    PubMed

    Mariner, W K

    1994-08-01

    Like most reform proposals, President Clinton's proposed Health Security Act offers universal access to care but does not significantly alter the nature of patients' legal rights to services. The act would create a system of delegated federal regulation in which the states would act like federal administrative agencies to carry out reform. To achieve uniform, universal coverage, the act would establish a form of mandatory health insurance, with federal law controlling the minimum services to which everyone would be entitled. Because there is no constitutionally protected right to health care and no independent constitutional standard for judging what insurance benefits are appropriate, the federal government would retain considerable freedom to decide what services would and would not be covered. If specific benefits are necessary for patients, they will have to be stated in the legislation that produces reform. PMID:8059899

  7. A scheme for secure quantum communication network with authentication using GHZ-like states and cluster states controlled teleportation

    NASA Astrophysics Data System (ADS)

    Naseri, Mosayeb; Raji, Mehrdad Ahmadzadeh; Hantehzadeh, Mohamad Reza; Farouk, Ahmed; Boochani, Arash; Solaymani, Shahram

    2015-11-01

    We propose a scheme for a secure message communication network with authentication following the idea in controlled teleportation. In this scheme, the servers of the network provide the service to prepare the entangled states as quantum channels. For preventing the eavesdropping, a security checking method is suggested. After the security check, any two users in the network may communicate securely and directly under the control of the servers on the network.

  8. Tools and Methods for Hardening Communication Security of Energy Delivery Systems

    SciTech Connect

    Gadgil, Shrirang; Lin, Yow-Jian; Ghosh, Abhrajit; Samtani, Sunil; Kang, Jaewon; Siegell, Bruce; Kaul, Vikram; Unger, John; De Bruet, Andre; Martinez, Catherine; Vermeulen, Gerald; Rasche, Galen; Sternfeld, Scott; Berthier, Robin; Bobba, Rakesh; Campbell, Roy; Sanders, Williams; Lin, Yow-Jian

    2014-06-30

    This document summarizes the research and development work the TT Government Solutions (TTGS), d.b.a. Applied Communication Sciences (ACS), team performed for the Department of Energy Cybersecurity for Energy Delivery Systems (CEDS) program. It addresses the challenges in protecting critical grid control and data communication, including the identification of vulnerabilities and deficiencies of communication protocols commonly used in energy delivery systems (e.g., ICCP, DNP3, C37.118, C12.22), as well as the development of effective means to detect and prevent the exploitation of such vulnerabilities and deficiencies. The team consists of • TT Government Solutions (TTGS), a leading provider of communications solutions that has extensive experience in commercializing communications solutions. TTGS also has deep cyber security research and development expertise supporting a variety of customers. • University of Illinois at Urbana-Champaign (UIUC), a leader in the cyber security research for the power grid. UIUC brings unique experience in designing secure communication protocols to this project. • Electric Power Research Institute (EPRI), an independent nonprofit that conducts research and development relating to the generation, delivery and use of electricity for the benefit of the public. EPRI brings to this effort its extensive technical expertise and its utility connections, with members representing more than 90 percent of the electricity generated and delivered in the United States. • DTE Energy, the 10th largest electric utility in the US, which helps ensure that this project focuses on the needs of utilities and is rightly positioned to address the needs of the market place. We designed, developed, and demonstrated a modular and extensible ADEC-G (Agent-based, Distributed, Extensible Cybersecurity for the Grid) system for monitoring/detecting abnormal energy delivery systems (EDS) protocol usage and ensuring security coverage. Our approach consists

  9. Toddlers' Complex Communication: Playfulness from a Secure Base

    ERIC Educational Resources Information Center

    Alcock, Sophie

    2013-01-01

    Attachment theory is presented in this article as involving embodied relational processes within complex relational systems. Two narrative-like "events" are represented to illustrate very young children playfully relating -- connecting and communicating inter- and intrasubjectively. The ethnographic-inspired research methods included…

  10. Secure optical communication system utilizing deformable MEMS mirrors

    NASA Astrophysics Data System (ADS)

    Ziph-Schatzberg, Leah; Bifano, Thomas; Cornelissen, Steven; Stewart, Jason; Bleier, Zvi

    2009-02-01

    An optical communication system suitable for voice, data retrieval from remote sensors and identification is described. The system design allows operation at ranges of several hundred meters. The heart of the system is a modulated MEMS mirror that is electrostatically actuated and changes between a flat reflective state and a corrugated diffractive state. A process for mass producing these mirrors at low cost was developed and is described. The mirror was incorporated as a facet in a hollow retro-reflector, allowing temporal modulation of an interrogating beam and the return of the modulated beam to the interrogator. This system thus consists of a low power, small and light communication node with large (about 60°) angular extent. The system's range and pointing are determined by the interrogator /detector/demodulator (Transceiver) unit. The transceiver is comprised of an optical channel to establish line of sight communication, an interrogating laser at 1550nm, an avalanche photo diode to detect the return signal and electronics to drive the laser and demodulate the detected signal and convert it to an audio signal. A functional prototype system was built using a modified compact optical sight as the transceiver. Voice communication in free space was demonstrated. The design and test of major components and the complete system are discussed.

  11. Social Security Act, 1987 (No. 10 of 1987), 13 February 1987.

    PubMed

    1987-01-01

    This document contains major portions of Malta's 1987 Social Security Act, which consolidates amendments made to the basic Social Security Act of 1956. The 1987 Act covers provision of free medical aid in the form of drugs, spectacles, dentures, and other prosthetic aids as needed to the head of a household for any member of the household in need if the total weekly income of all members of the household does not exceed a specified limit. Guardians of any orphan of an insured citizen of Malta are entitled to a specified Orphan's Allowance. The Act also authorizes a lump sum marriage grant to any person employed or self-employed for at least 6 months at any time prior to the marriage, and provides for maternity benefits for citizens or spouses of citizens normally resident on Malta. Maternity benefits are withheld from claimants who received the benefits on 3 occasions before the date of the claim and have 3 or more children living at the date of the claim. The Act also provides family allowances of decreasing amounts for each child in specified circumstances. PMID:12346731

  12. Practical Quantum Cryptography for Secure Free-Space Communications

    SciTech Connect

    Buttler, W.T.; Hughes, R.J.; Kwiat, P.G.; Lamoreaux, S.K.; Morgan, G.L.; Nordholt, J.E.; Peterson, C.G.

    1999-02-01

    Quantum cryptography is an emerging technology in which two parties may simultaneously generate shared, secret cryptographic key material using the transmission of quantum states of light. The security of these transmissions is based on the inviolability of the laws of quantum mechanics and information-theoretically secure post-processing methods. An adversary can neither successfully tap the quantum transmissions, nor evade detection, owing to Heisenberg's uncertainty principle. In this paper we describe the theory of quantum cryptography, and the most recent results from our experimental free-space system with which we have demonstrated for the first time the feasibility of quantum key generation over a point-to-point outdoor atmospheric path in daylight. We achieved a transmission distance of 0.5 km, which was limited only by the length of the test range. Our results provide strong evidence that cryptographic key material could be generated on demand between a ground station and a satellite (or between two satellites), allowing a satellite to be securely re-keyed on orbit. We present a feasibility analysis of surface-to-satellite quantum key generation.

  13. Secure digital voice communications in the Defense Data Network (DDN)

    NASA Astrophysics Data System (ADS)

    Bernet, M.; Gan, D.; Oesterreicher, C.

    1985-03-01

    This final report has investigated and validated one of the fourteen key features of the future, all-digital World-wide Digital Systems Architecture (WWDSA), namely the enhanced 2.4 Kbps secure voice survivability through the use of packetized voice and the use of packetized voice and the interconnection between the voice survivability through the use of packetized voice and the interconnection between the voice (DSN) phase implementation plan in the report, Secure Voice, as provided by the STU-IIs, can be implemented in the DDN in the late 1980s time-frame with no technical and minimum schedule risk. VIUs are proposed to interconnect, the family of secure voice terminals, called STU-IIs, to the DDN. VIUs contain modan, signalling and supervision (S/S), and processor modules and are supported by the implementation model of the protocol architecture that (with the TAC as processor module) was proposed in the report. An optimum system-level architecture employing the VIUs and the proposed in the implementation plan based on an extensive evaluation.

  14. Cryptanalysis of Quantum Secure Direct Communication and Authentication Scheme via Bell States

    NASA Astrophysics Data System (ADS)

    Gao, Fei; Qin, Su-Juan; Guo, Fen-Zhuo; Wen, Qiao-Yan

    2011-02-01

    The security of the quantum secure direct communication (QSDC) and authentication protocol based on Bell states is analyzed. It is shown that an eavesdropper can invalidate the authentication function, and implement a successful man-in-the-middle attack, where he/she can obtain or even modify the transmitted secret without introducing any error. The particular attack strategy is demonstrated and an improved protocol is presented.

  15. Comment on "Quantum Secure Direct Communication with Authentication Expansion Using Single Photons"

    NASA Astrophysics Data System (ADS)

    Yang, Yu-Guang; Jia, Xin; Xia, Juan; Shi, Lei; Zhang, Hua

    2012-12-01

    The security of the quantum secure direct communication protocol with authentication expansion using single photons is analyzed. It is shown that an eavesdropper can obtain or even modify the transmitted secret without introducing any error by implementing a simple man-in-the-middle attack after the authentication is successfully carried out. Furthermore, a denial-of-service attack is also discussed. The particular attack strategy is demonstrated and an improved protocol is presented.

  16. Quantum secure communication using continuous variable Einstein-Podolsky-Rosen correlations

    SciTech Connect

    He Guangqiang; Zhu Jun; Zeng Guihua

    2006-01-15

    A quantum secure communication protocol using correlations of continuous variable Einstein-Podolsky-Rosen (EPR) pairs is proposed. The proposed protocol may implement both quantum key distribution and quantum message encryption by using a nondegenerate optical parametric amplifier (NOPA). The general Gaussian-cloner attack strategy is investigated in detail by employing Shannon information theory. Results show that the proposed scheme is secure, which is guaranteed physically by the correlations of the continuous variable EPR entanglement pairs generated by the NOPA.

  17. NASA ACTS Multibeam Antenna (MBA) System. [Advanced Communications Technology Satellite

    NASA Technical Reports Server (NTRS)

    Choung, Youn H.; Stiles, W. Herschel; Wu, Joseph; Wong, William C.; Chen, C. Harry

    1986-01-01

    The design of the Advanced Communications Technology Satellite MBA system, which provides both spot beam and scanning beam coverage to both high and low burst rates data-users is examined. The MBA consists of receive and transmit antennas installed on a common precision mounting platform that is integrated to the bus through three flexures; a lightweight system with low thermal distortion is obtained by using composite materials for the MBA structures. The RF design, which is a Cassegrain reflector with a large equivalent focal length/aperture size, is described. Consideration is given to the position of the feed in order to minimize scan loss and sidelobe levels, the size of the subreflector in order to minimize feed spillover, and antenna performance degradation caused by reflector surface distortion. Breadbroad model test result reveal that the maximum sidelobe level outside the 2.5 HPBW region is -30 dB or lower relative to the power.

  18. On KLJN-based Secure Key Distribution in Vehicular Communication Networks

    NASA Astrophysics Data System (ADS)

    Cao, X.; Saez, Y.; Pesti, G.; Kish, L. B.

    2015-12-01

    In a former paper [Fluct. Noise Lett. 13 (2014) 1450020] we introduced a vehicular communication system with unconditionally secure key exchange based on the Kirchhoff-Law-Johnson-Noise (KLJN) key distribution scheme. In this paper, we address the secure KLJN key donation to vehicles. This KLJN key donation solution is performed lane-by-lane by using roadside key provider equipment embedded in the pavement. A method to compute the lifetime of the KLJN key is also given. This key lifetime depends on the car density and gives an upper limit of the lifetime of the KLJN key for vehicular communication networks.

  19. Novel Multiparty Controlled Bidirectional Quantum Secure Direct Communication Based on Continuous-variable States

    NASA Astrophysics Data System (ADS)

    Yu, Zhen-Bo; Gong, Li-Hua; Wen, Ru-Hong

    2016-03-01

    A novel multiparty controlled bidirectional quantum secure direct communication protocol combining continuous-variable states with qubit block transmission is proposed. Two legitimate communication parties encode their own secret information into entangled optical modes with translation operations, and the secret information of each counterpart can only be recovered under the permission of all controllers. Due to continuous-variable states and block transmission strategy, the proposed protocol is easy to realize with perfect qubit efficiency. Security analyses show that the proposed protocol is free from common attacks, including the man-in-the-middle attack.

  20. L-Band Digital Aeronautical Communications System Engineering - Initial Safety and Security Risk Assessment and Mitigation

    NASA Technical Reports Server (NTRS)

    Zelkin, Natalie; Henriksen, Stephen

    2011-01-01

    This document is being provided as part of ITT's NASA Glenn Research Center Aerospace Communication Systems Technical Support (ACSTS) contract NNC05CA85C, Task 7: "New ATM Requirements--Future Communications, C-Band and L-Band Communications Standard Development." ITT has completed a safety hazard analysis providing a preliminary safety assessment for the proposed L-band (960 to 1164 MHz) terrestrial en route communications system. The assessment was performed following the guidelines outlined in the Federal Aviation Administration Safety Risk Management Guidance for System Acquisitions document. The safety analysis did not identify any hazards with an unacceptable risk, though a number of hazards with a medium risk were documented. This effort represents a preliminary safety hazard analysis and notes the triggers for risk reassessment. A detailed safety hazards analysis is recommended as a follow-on activity to assess particular components of the L-band communication system after the technology is chosen and system rollout timing is determined. The security risk analysis resulted in identifying main security threats to the proposed system as well as noting additional threats recommended for a future security analysis conducted at a later stage in the system development process. The document discusses various security controls, including those suggested in the COCR Version 2.0.

  1. Developing a Standard Method for Link-Layer Security of CCSDS Space Communications

    NASA Technical Reports Server (NTRS)

    Biggerstaff, Craig

    2009-01-01

    Communications security for space systems has been a specialized field generally far removed from considerations of mission interoperability and cross-support in fact, these considerations often have been viewed as intrinsically opposed to security objectives. The space communications protocols defined by the Consultative Committee for Space Data Systems (CCSDS) have a twenty-five year history of successful use in over 400 missions. While the CCSDS Telemetry, Telecommand, and Advancing Orbiting Systems protocols for use at OSI Layer 2 are operationally mature, there has been no direct support within these protocols for communications security techniques. Link-layer communications security has been successfully implemented in the past using mission-unique methods, but never before with an objective of facilitating cross-support and interoperability. This paper discusses the design of a standard method for cryptographic authentication, encryption, and replay protection at the data link layer that can be integrated into existing CCSDS protocols without disruption to legacy communications services. Integrating cryptographic operations into existing data structures and processing sequences requires a careful assessment of the potential impediments within spacecraft, ground stations, and operations centers. The objective of this work is to provide a sound method for cryptographic encapsulation of frame data that also facilitates Layer 2 virtual channel switching, such that a mission may procure data transport services as needed without involving third parties in the cryptographic processing, or split independent data streams for separate cryptographic processing.

  2. A Novel Quantum Covert Channel Protocol Based on Any Quantum Secure Direct Communication Scheme

    NASA Astrophysics Data System (ADS)

    Xu, Shu-Jiang; Chen, Xiu-Bo; Niu, Xin-Xin; Yang, Yi-Xian

    2013-05-01

    By analyzing the basic properties of unitary transformations used in a quantum secure direct communication (QSDC) protocol, we show the main idea why a covert channel can be established within any QSDC channel which employs unitary transformations to encode information. On the basis of the fact that the unitary transformations used in a QSDC protocol are secret and independent, a novel quantum covert channel protocol is proposed to transfer secret messages with unconditional security. The performance, including the imperceptibility, capacity and security of the proposed protocol are analyzed in detail.

  3. 47 CFR 80.159 - Operator requirements of Title III of the Communications Act and the Safety Convention.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Operator requirements of Title III of the Communications Act and the Safety Convention. 80.159 Section 80.159 Telecommunication FEDERAL COMMUNICATIONS... Communications Act and the Safety Convention. (a) Each telegraphy passenger ship equipped with a...

  4. Quantum secure direct communication against the collective noise with polarization-entangled Bell states

    NASA Astrophysics Data System (ADS)

    Dong, Li; Wang, Jun-Xi; Li, Qing-Yang; Shen, Hong-Zhi; Dong, Hai-Kuan; Xiu, Xiao-Ming; Ren, Yuan-Peng; Gao, Ya-Jun

    2015-12-01

    We propose a quantum secure direct communication protocol via a collective noise channel, exploiting polarization-entangled Bell states and the nondemolition parity analysis based on weak cross-Kerr nonlinearities. The participant Bob, who will receive the secret information, sends one of two photons in a polarization-entangled Bell state exploiting the transmission circuit against the collective noise to the participant Alice, who will send the secret information, by the means of photon block transmission. If the first security check employing the nondemolition parity analysis is passed, the task of securely distributing the quantum channel is fulfilled. Encoding secret information on the photons sent from Bob by performing single-photon unitary transformation operations, Alice resends these photons to Bob through the transmission circuit against the collective noise. Exploiting the nondemolition parity analysis to distinguish Bell states, Bob can obtain the secret information from Alice after the second security check is passed, and the resulting Bell states can be applied to other tasks of quantum information processing. Under the condition of the secure quantum channel being confirmed, the photons that are utilized in the role of the security check can be applied to the function of secure direct communication, thus enhancing the efficiency of transmitting secret information and saving a lot of resources.

  5. 76 FR 82353 - Implementing the Provisions of the Communications Act of 1934, as Enacted by the Twenty-First...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-30

    ...In this document, the Commission adopts rules that implement provisions of section 104 of the Twenty-First Century Communications and Video Accessibility Act of 2010 (CVAA), Public Law 111-260, the most significant accessibility legislation since the passage of the Americans with Disabilities Act (ADA) in 1990. A Proposed Rule relating to implementation of section 718 of the Communications Act......

  6. Secure communication of static information by electronic means

    DOEpatents

    Gritton, Dale G.

    1994-01-01

    A method and apparatus (10) for the secure transmission of static data (16) from a tag (11) to a remote reader (12). Each time the static data (16) is to be transmitted to the reader (12), the 10 bits of static data (16) are combined with 54 bits of binary data (21), which constantly change from one transmission to the next, into a 64-bit number (22). This number is then encrypted and transmitted to the remote reader (12) where it is decrypted (26) to produce the same 64 bit number that was encrypted in the tag (11). With a continual change in the value of the 64 bit number (22) in the tag, the encrypted numbers transmitted to the reader (12) will appear to be dynamic in character rather than being static.

  7. Use of LSP in securing wireless LAN communications

    NASA Astrophysics Data System (ADS)

    Newman, Richard E.; Bouldin, B.; Broccard, Phillipe; Coscenza, Thomas; Farago, Steve; Hoyt, Mark; Nolan, Keith; Sanders, Mark; Swanson, Tim; Winner, Joe

    2000-11-01

    The Layered Service Provider (LSP) is a mechanism available in Microsoft Windows 95 and Windows 98 to insert a protocol layer between the Winsock library calls and the transport layer of the network protocol stack. This paper discusses the use of encryption at the LSP to provide for security on wireless LANs that is transparent to the applications. Use of the LSP allows similarly transparent cryptographic isolation over any medium that may be accessed by the network protocol stack. Hardware-based cryptography in the form of Fortezza cards was used for this project, but the approach works just as well with software-based cryptography. The system was developed jointly by teams at the University of Florida in its Integrated Process and Product Design (IPPD) course and a liaison engineer at Raytheon Systems Division.

  8. Field test of a practical secure communication network with decoy-state quantum cryptography.

    PubMed

    Chen, Teng-Yun; Liang, Hao; Liu, Yang; Cai, Wen-Qi; Ju, Lei; Liu, Wei-Yue; Wang, Jian; Yin, Hao; Chen, Kai; Chen, Zeng-Bing; Peng, Cheng-Zhi; Pan, Jian-Wei

    2009-04-13

    We present a secure network communication system that operated with decoy-state quantum cryptography in a real-world application scenario. The full key exchange and application protocols were performed in real time among three nodes, in which two adjacent nodes were connected by approximate 20 km of commercial telecom optical fiber. The generated quantum keys were immediately employed and demonstrated for communication applications, including unbreakable real-time voice telephone between any two of the three communication nodes, or a broadcast from one node to the other two nodes by using one-time pad encryption. PMID:19365479

  9. Children's Security in the Context of Family Instability and Maternal Communications

    ERIC Educational Resources Information Center

    Winter, Marcia A.; Davies, Patrick T.; Cummings, E. Mark

    2010-01-01

    This multimethod study examined the association between family instability and children's internal representations of security in the family system within the context of maternal communications about disruptive family events. Participants included 224 kindergarten children (100 boys and 124 girls) and their parents. Parents reported on the…

  10. Application of Ica-Eemd to Secure Communications in Chaotic Systems

    NASA Astrophysics Data System (ADS)

    Lin, Shih-Lin; Tung, Pi-Cheng; Huang, Norden E.

    2012-04-01

    We propose the application of ICA-EEMD to secure communication systems. ICA-EEMD is employed to retrieve the message data encrypted by a mixture of Gaussian white noise and chaotic noise. The results showed that ICA-EEMD can effectively extract the two original message data.

  11. Man-in-the-middle attack on quantum secure communications with authentication

    NASA Astrophysics Data System (ADS)

    Lin, Tzu Han; Hwang, Tzonelish

    2014-04-01

    This study points out a man-in-the-middle (MIM) attack on many of quantum secure communication with authentication protocols. The MIM attack is due to a design carelessness on performing public discussions on a nonauthenticated classical channel. A possible solution is proposed to solve the problem.

  12. 76 FR 70164 - Certain Devices With Secure Communication Capabilities, Components Thereof, and Products...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-10

    ...Notice is hereby given that the U.S. International Trade Commission has received a complaint entitled In Re Certain Devices with Secure Communication Capabilities, Components Thereof, and Products Containing the Same, DN 2854; the Commission is soliciting comments on any public interest issues raised by the...

  13. Comment on 'Secure direct communication with a quantum one-time pad'

    SciTech Connect

    Hoffmann, Holger; Bostroem, Kim; Felbinger, Timo

    2005-07-15

    In the paper [Phys. Rev. A 69, 052319 (2004)], a quantum direct communication protocol is proposed which is claimed to be unconditionally secure even for the case of a noisy channel. We show that this is not the case by giving an undetectable attack scheme.

  14. CSRQ: Communication-Efficient Secure Range Queries in Two-Tiered Sensor Networks.

    PubMed

    Dai, Hua; Ye, Qingqun; Yang, Geng; Xu, Jia; He, Ruiliang

    2016-01-01

    In recent years, we have seen many applications of secure query in two-tiered wireless sensor networks. Storage nodes are responsible for storing data from nearby sensor nodes and answering queries from Sink. It is critical to protect data security from a compromised storage node. In this paper, the Communication-efficient Secure Range Query (CSRQ)-a privacy and integrity preserving range query protocol-is proposed to prevent attackers from gaining information of both data collected by sensor nodes and queries issued by Sink. To preserve privacy and integrity, in addition to employing the encoding mechanisms, a novel data structure called encrypted constraint chain is proposed, which embeds the information of integrity verification. Sink can use this encrypted constraint chain to verify the query result. The performance evaluation shows that CSRQ has lower communication cost than the current range query protocols. PMID:26907293

  15. Orthogonal-state-based deterministic secure quantum communication without actual transmission of the message qubits

    NASA Astrophysics Data System (ADS)

    Shukla, Chitra; Pathak, Anirban

    2014-09-01

    Recently, an orthogonal-state-based protocol of direct quantum communication without actual transmission of particles is proposed by Salih et al. (Phys Rev Lett 110:170502, 2013) using chained quantum Zeno effect. The counterfactual condition (claim) of Salih et al. is weakened here to the extent that transmission of particles is allowed, but transmission of the message qubits (the qubits on which the secret information is encoded) is not allowed. Remaining within this weaker (non-counterfactual) condition, an orthogonal-state-based protocol of deterministic secure quantum communication is proposed using entanglement swapping, where actual transmission of the message qubits is not required. Further, it is shown that there exists a large class of quantum states that can be used to implement the proposed protocol. The security of the proposed protocol originates from monogamy of entanglement. As the protocol can be implemented without using conjugate coding, its security is independent of non-commutativity.

  16. CSRQ: Communication-Efficient Secure Range Queries in Two-Tiered Sensor Networks

    PubMed Central

    Dai, Hua; Ye, Qingqun; Yang, Geng; Xu, Jia; He, Ruiliang

    2016-01-01

    In recent years, we have seen many applications of secure query in two-tiered wireless sensor networks. Storage nodes are responsible for storing data from nearby sensor nodes and answering queries from Sink. It is critical to protect data security from a compromised storage node. In this paper, the Communication-efficient Secure Range Query (CSRQ)—a privacy and integrity preserving range query protocol—is proposed to prevent attackers from gaining information of both data collected by sensor nodes and queries issued by Sink. To preserve privacy and integrity, in addition to employing the encoding mechanisms, a novel data structure called encrypted constraint chain is proposed, which embeds the information of integrity verification. Sink can use this encrypted constraint chain to verify the query result. The performance evaluation shows that CSRQ has lower communication cost than the current range query protocols. PMID:26907293

  17. Controlled quantum secure direct communication by entanglement distillation or generalized measurement

    NASA Astrophysics Data System (ADS)

    Tan, Xiaoqing; Zhang, Xiaoqian

    2016-05-01

    We propose two controlled quantum secure communication schemes by entanglement distillation or generalized measurement. The sender Alice, the receiver Bob and the controllers David and Cliff take part in the whole schemes. The supervisors David and Cliff can control the information transmitted from Alice to Bob by adjusting the local measurement angles θ _4 and θ _3. Bob can verify his secret information by classical one-way function after communication. The average amount of information is analyzed and compared for these two methods by MATLAB. The generalized measurement is a better scheme. Our schemes are secure against some well-known attacks because classical encryption and decoy states are used to ensure the security of the classical channel and the quantum channel.

  18. Installation of secure, always available wireless LAN systems as a component of the hospital communication infrastructure.

    PubMed

    Hanada, Eisuke; Kudou, Takato; Tsumoto, Shusaku

    2013-06-01

    Wireless technologies as part of the data communication infrastructure of modern hospitals are being rapidly introduced. Even though there are concerns about problems associated with wireless communication security, the demand is remarkably large. In addition, insuring that the network is always available is important. Herein, we discuss security countermeasures and points to insure availability that must be taken to insure safe hospital/business use of wireless LAN systems, referring to the procedures introduced at Shimane University Hospital. Security countermeasures differ according to their purpose, such as for preventing illegal use or insuring availability, both of which are discussed. It is our hope that this information will assist others in their efforts to insure safe implementation of wireless LAN systems, especially in hospitals where they have the potential to greatly improve information sharing and patient safety. PMID:23519703

  19. A secure and easy-to-implement web-based communication framework for caregiving robot teams

    NASA Astrophysics Data System (ADS)

    Tuna, G.; Daş, R.; Tuna, A.; Örenbaş, H.; Baykara, M.; Gülez, K.

    2016-03-01

    In recent years, robots have started to become more commonplace in our lives, from factory floors to museums, festivals and shows. They have started to change how we work and play. With an increase in the population of the elderly, they have also been started to be used for caregiving services, and hence many countries have been investing in the robot development. The advancements in robotics and wireless communications has led to the emergence of autonomous caregiving robot teams which cooperate to accomplish a set of tasks assigned by human operators. Although wireless communications and devices are flexible and convenient, they are vulnerable to many risks compared to traditional wired networks. Since robots with wireless communication capability transmit all data types, including sensory, coordination, and control, through radio frequencies, they are open to intruders and attackers unless protected and their openness may lead to many security issues such as data theft, passive listening, and service interruption. In this paper, a secure web-based communication framework is proposed to address potential security threats due to wireless communication in robot-robot and human-robot interaction. The proposed framework is simple and practical, and can be used by caregiving robot teams in the exchange of sensory data as well as coordination and control data.

  20. 17 CFR 250.14 - Exemption of acquisitions of securities of power supply companies from section 9(a)(2) of the Act.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... securities of power supply companies from section 9(a)(2) of the Act. 250.14 Section 250.14 Commodity and... of securities of power supply companies from section 9(a)(2) of the Act. (a) An electric utility... exempt from section 9(a)(2) of the Act with respect to the acquisition of any security of a power...

  1. Control and Non-Payload Communications (CNPC) Prototype Radio - Generation 2 Security Architecture Lab Test Report

    NASA Technical Reports Server (NTRS)

    Iannicca, Dennis C.; McKim, James H.; Stewart, David H.; Thadhani, Suresh K.; Young, Daniel P.

    2015-01-01

    NASA Glenn Research Center, in cooperation with Rockwell Collins, is working to develop a prototype Control and Non-Payload Communications (CNPC) radio platform as part of NASA Integrated Systems Research Program's (ISRP) Unmanned Aircraft Systems (UAS) Integration in the National Airspace System (NAS) project. A primary focus of the project is to work with the FAA and industry standards bodies to build and demonstrate a safe, secure, and efficient CNPC architecture that can be used by industry to evaluate the feasibility of deploying a system using these technologies in an operational capacity. GRC has been working in conjunction with these groups to assess threats, identify security requirements, and to develop a system of standards-based security controls that can be applied to the current GRC prototype CNPC architecture as a demonstration platform. The security controls were integrated into a lab test bed mock-up of the Mobile IPv6 architecture currently being used for NASA flight testing, and a series of network tests were conducted to evaluate the security overhead of the controls compared to the baseline CNPC link without any security. The aim of testing was to evaluate the performance impact of the additional security control overhead when added to the Mobile IPv6 architecture in various modes of operation. The statistics collected included packet captures at points along the path to gauge packet size as the sample data traversed the CNPC network, round trip latency, jitter, and throughput. The effort involved a series of tests of the baseline link, a link with Robust Header Compression (ROHC) and without security controls, a link with security controls and without ROHC, and finally a link with both ROHC and security controls enabled. The effort demonstrated that ROHC is both desirable and necessary to offset the additional expected overhead of applying security controls to the CNPC link.

  2. 77 FR 20079 - Securities Exchange Act of 1934; In the Matter of the NASDAQ Stock Market LLC; Order Granting...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-03

    ... Securities Exchange Act Release No. 65362 (September 20, 2011), 76 FR 59466 (September 26, 2011). It is... Petition for Review and Scheduling Filing of Statements Pursuant to Rule 431 of the Rules of...

  3. The decision to exclude agricultural and domestic workers from the 1935 Social Security Act.

    PubMed

    DeWitt, Larry

    2010-01-01

    The Social Security Act of 1935 excluded from coverage about half the workers in the American economy. Among the excluded groups were agricultural and domestic workers-a large percentage of whom were African Americans. This has led some scholars to conclude that policymakers in 1935 deliberately excluded African Americans from the Social Security system because of prevailing racial biases during that period. This article examines both the logic of this thesis and the available empirical evidence on the origins of the coverage exclusions. The author concludes that the racial-bias thesis is both conceptually flawed and unsupported by the existing empirical evidence. The exclusion of agricultural and domestic workers from the early program was due to considerations of administrative feasibility involving tax-collection procedures. The author finds no evidence of any other policy motive involving racial bias. PMID:21261169

  4. Communicative Acts of a Child with Rubinstein-Taybi Syndrome during Early Communicative Development

    ERIC Educational Resources Information Center

    Carvey, Jayme S.; Bernhardt, B. May

    2009-01-01

    Rubinstein-Taybi syndrome (RTS) is a rare genetic developmental disorder that often shows associated language delay. However, literature on language development in RTS is very limited, particularly for the period of early communicative development, when standardized testing can be minimally informative. The purpose of the current study was to…

  5. 75 FR 17181 - Order Extending Temporary Exemptions Under the Securities Exchange Act of 1934 in Connection With...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-05

    ... From the Federal Register Online via the Government Publishing Office SECURITIES AND EXCHANGE COMMISSION Order Extending Temporary Exemptions Under the Securities Exchange Act of 1934 in Connection With Request of Chicago Mercantile Exchange Inc. Related to Central Clearing of Credit Default Swaps, and Request for Comments March 30, 2010....

  6. 75 FR 5609 - Privacy Act of 1974; Department of Homeland Security/ALL-024 Facility and Perimeter Access...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-03

    ...In accordance with the Privacy Act of 1974 the Department of Homeland Security proposes to update and reissue Department of Homeland Security/ALL--024 Facility and Perimeter Access Control and Visitor Management System of Records to include record systems within the Federal Protective Service. Categories of individuals, categories of records, purpose and routine uses of this system have been......

  7. 78 FR 15889 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security U.S. Customs...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-13

    ...The Department of Homeland Security is giving concurrent notice of a newly established system of records pursuant to the Privacy Act of 1974 for the ``Department of Homeland Security/U.S. Customs and Border Protection, DHS/CBP-018--Customs--Trade Partnership Against Terrorism (C-TPAT) System of Records'' and this proposed rulemaking. In this proposed rulemaking, the Department proposes to......

  8. 75 FR 39184 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL-029 Civil...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-08

    .../Civil Rights and Civil Liberties--001 Matters System of Records (69 FR 70464, December 6, 2004) and... Exemptions; Department of Homeland Security/ALL--029 Civil Rights and Civil Liberties Records System of... Privacy Act of 1974 for the Department of Homeland Security/ALL--029 Civil Rights and Civil...

  9. 76 FR 53921 - Privacy Act of 1974; Department of Homeland Security ALL-034 Emergency Care Medical Records...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-30

    ... employees, their records are considered part of the OPM/GOVT-10--Employee Medical File System Records, 71 FR... considered part of the OPM/GOVT- ] 10--Employee Medical File System Records, 71 FR 35360 (Jun. 19, 2006... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security ALL--034...

  10. The Use of Peer Networks to Increase Communicative Acts of Students with Autism Spectrum Disorders

    ERIC Educational Resources Information Center

    Kamps, Debra; Mason, Rose; Thiemann-Bourque, Kathy; Feldmiller, Sarah; Turcotte, Amy; Miller, Todd

    2014-01-01

    Peer networks including social groups using typical peers, scripted instruction, visual text cues, and reinforcement were examined with students with autism spectrum disorders (ASD). A multiple baseline design across four participants was used to measure students' use of communication acts with peers during free play following instruction.…

  11. 47 CFR 20.15 - Requirements under Title II of the Communications Act.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... CFR part 68; and §§ 1.701-1.748, and 1.815 of this chapter, 47 CFR 1.701-1.748, 1.815. (b) Commercial... CARRIER SERVICES COMMERCIAL MOBILE RADIO SERVICES § 20.15 Requirements under Title II of the Communications Act. (a) Commercial mobile radio services providers, to the extent applicable, must comply...

  12. 78 FR 54946 - Privacy Act; System of Records: Digital Outreach and Communications, State-79

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-06

    ...Notice is hereby given that the Department of State proposes to create a system of records, Digital Outreach and Communications, State-79, pursuant to the provisions of the Privacy Act of 1974, as amended (5 U.S.C. 552a) and Office of Management and Budget Circular No. A-130, Appendix...

  13. Awareness, Perceptions, and Communication Needs about the Affordable Care Act across the Life Span

    ERIC Educational Resources Information Center

    Bergeron, Caroline D.; Friedman, Daniela B.; Sisson, Diana C.; Tanner, Andrea; Kornegay, Vance L.; Owens, Otis L.; Weis, Megan A.; Patterson, Lee L.

    2016-01-01

    Background: By March 2014, all U.S. citizens were required to have health insurance according to the Affordable Care Act (ACA). Purpose: Study objectives were to explore individuals' opinions, perceptions, and communication sources and needs about the ACA and to assess differences by age group. Methods: In November 2013, 10 1-hour focus groups (5…

  14. The Communications Competitiveness and Infrastructure Modernization Act of 1991 (S. 1200).

    ERIC Educational Resources Information Center

    Sikes, Alfred C.; Verveer, Philip L.

    1992-01-01

    Two papers present arguments for and against the Communications Competitiveness and Infrastructure Act of 1991 (S. 1200). Topics addressed include earlier policy recommendations, competition in the telecommunications industry, benefits of video dial tone availability, telephone company participation in video services, restrictions on telephone…

  15. Communicative Acts in Coach-Athlete Interactions: When Losing Competitions and when Making Mistakes in Training

    ERIC Educational Resources Information Center

    Sagar, Sam S.; Jowett, Sophia

    2012-01-01

    Athletes' perceptions of coaches' communicative acts of interaction in two key interpersonal situations were examined, and their impact on the athletes: (a) when athletes lose competitions; and, (b) when athletes make mistakes in training. Athletes (N = 324, M age = 20.11) completed an open-ended survey. Data were deductively and inductively…

  16. A Re-Examination of Section 315 of the Communications Act of 1934.

    ERIC Educational Resources Information Center

    Anapol, Malthon M.

    A review of national presidential election campaigns since the passage of Section 315 of the Communications Act of 1934 indicates the inadequacies of that section and the need for its revision. Section 315 stipulates equal access to the mass media for all legally qualified political candidates. Basically, the difficulty with Section 315 is that it…

  17. A generalized architecture of quantum secure direct communication for N disjointed users with authentication.

    PubMed

    Farouk, Ahmed; Zakaria, Magdy; Megahed, Adel; Omara, Fatma A

    2015-01-01

    In this paper, we generalize a secured direct communication process between N users with partial and full cooperation of quantum server. So, N - 1 disjointed users u1, u2, …, uN-1 can transmit a secret message of classical bits to a remote user uN by utilizing the property of dense coding and Pauli unitary transformations. The authentication process between the quantum server and the users are validated by EPR entangled pair and CNOT gate. Afterwards, the remained EPR will generate shared GHZ states which are used for directly transmitting the secret message. The partial cooperation process indicates that N - 1 users can transmit a secret message directly to a remote user uN through a quantum channel. Furthermore, N - 1 users and a remote user uN can communicate without an established quantum channel among them by a full cooperation process. The security analysis of authentication and communication processes against many types of attacks proved that the attacker cannot gain any information during intercepting either authentication or communication processes. Hence, the security of transmitted message among N users is ensured as the attacker introduces an error probability irrespective of the sequence of measurement. PMID:26577473

  18. A generalized architecture of quantum secure direct communication for N disjointed users with authentication

    PubMed Central

    Farouk, Ahmed; Zakaria, Magdy; Megahed, Adel; Omara, Fatma A.

    2015-01-01

    In this paper, we generalize a secured direct communication process between N users with partial and full cooperation of quantum server. So, N − 1 disjointed users u1, u2, …, uN−1 can transmit a secret message of classical bits to a remote user uN by utilizing the property of dense coding and Pauli unitary transformations. The authentication process between the quantum server and the users are validated by EPR entangled pair and CNOT gate. Afterwards, the remained EPR will generate shared GHZ states which are used for directly transmitting the secret message. The partial cooperation process indicates that N − 1 users can transmit a secret message directly to a remote user uN through a quantum channel. Furthermore, N − 1 users and a remote user uN can communicate without an established quantum channel among them by a full cooperation process. The security analysis of authentication and communication processes against many types of attacks proved that the attacker cannot gain any information during intercepting either authentication or communication processes. Hence, the security of transmitted message among N users is ensured as the attacker introduces an error probability irrespective of the sequence of measurement. PMID:26577473

  19. Self-Assembled Resonance Energy Transfer Keys for Secure Communication over Classical Channels.

    PubMed

    Nellore, Vishwa; Xi, Sam; Dwyer, Chris

    2015-12-22

    Modern authentication and communication protocols increasingly use physical keys in lieu of conventional software-based keys for security. This shift is primarily driven by the ability to derive a unique, unforgeable signature from a physical key. The sole demonstration of an unforgeable key, thus far, has been through quantum key distribution, which suffers from limited communication distances and expensive infrastructure requirements. Here, we show a method for creating unclonable keys by molecular self-assembly of resonance energy transfer (RET) devices. It is infeasible to clone the RET-key due to the inability to characterize the key using current technology, the large number of input-output combinations per key, and the variation of the key's response with time. However, the manufacturer can produce multiple identical devices, which enables inexpensive, secure authentication and communication over classical channels, and thus any distance. Through a detailed experimental survey of the nanoscale keys, we demonstrate that legitimate users are successfully authenticated 99.48% of the time and the false-positives are only 0.39%, over two attempts. We estimate that a legitimate user would have a computational advantage of more than 10(340) years over an attacker. Our method enables the discovery of physical key based multiparty authentication and communication schemes that are both practical and possess unprecedented security. PMID:26525314

  20. High security chaotic multiple access scheme for visible light communication systems with advanced encryption standard interleaving

    NASA Astrophysics Data System (ADS)

    Qiu, Junchao; Zhang, Lin; Li, Diyang; Liu, Xingcheng

    2016-06-01

    Chaotic sequences can be applied to realize multiple user access and improve the system security for a visible light communication (VLC) system. However, since the map patterns of chaotic sequences are usually well known, eavesdroppers can possibly derive the key parameters of chaotic sequences and subsequently retrieve the information. We design an advanced encryption standard (AES) interleaving aided multiple user access scheme to enhance the security of a chaotic code division multiple access-based visible light communication (C-CDMA-VLC) system. We propose to spread the information with chaotic sequences, and then the spread information is interleaved by an AES algorithm and transmitted over VLC channels. Since the computation complexity of performing inverse operations to deinterleave the information is high, the eavesdroppers in a high speed VLC system cannot retrieve the information in real time; thus, the system security will be enhanced. Moreover, we build a mathematical model for the AES-aided VLC system and derive the theoretical information leakage to analyze the system security. The simulations are performed over VLC channels, and the results demonstrate the effectiveness and high security of our presented AES interleaving aided chaotic CDMA-VLC system.

  1. Study and Analysis of the Internet Protocol Security and Its Impact on Interactive Communications

    NASA Astrophysics Data System (ADS)

    Khan, Arshi; Ansari, Seema

    Internet Protocol Security (IPSec) is the defacto standard, which offers secured Internet communications, providing traffic integrity, confidentiality and authentication. Besides this, it is assumed that IPSec is not suitable for the protection of realtime audio transmissions as the IPSec related enlargement of packets and the usage of the Cipher Block Chaining (CBC) mode contradict stringent requirements. IPSec overhead of at least 44 bytes for each Internet Protocol (IP)-packet cannot guarantee Quality of Service (QOS) due to a bad wireless link by which the Ethernet flow control intercepts and makes a real time transmission impossible.

  2. 76 FR 39927 - Order Granting Temporary Exemptions Under the Securities Exchange Act of 1934 in Connection With...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-07

    .... 9204, Securities Exchange Act Release No. 64372 (Apr. 29, 2011), 76 FR 29818 (May 23, 2011); Further.... 63452 (Dec. 7, 2010), 75 FR 80174 (Dec. 21, 2010). Moreover, section 712(a)(8) of the Dodd-Frank Act.... The Commission and the CFTC have jointly proposed such regulations. See 76 FR 29818. Title VII...

  3. Advanced Communication Technology Satellite (ACTS) Very Small Aperture Terminal (VSAT) Network Control Performance

    NASA Technical Reports Server (NTRS)

    Coney, T. A.

    1996-01-01

    This paper discusses the performance of the network control function for the Advanced Communications Technology Satellite (ACTS) very small aperture terminal (VSAT) full mesh network. This includes control of all operational activities such as acquisition, synchronization, timing and rain fade compensation as well as control of all communications activities such as on-demand integrated services (voice, video, and date) connects and disconnects Operations control is provided by an in-band orderwire carried in the baseboard processor (BBP) control burst, the orderwire burst, the reference burst, and the uplink traffic burst. Communication services are provided by demand assigned multiple access (DAMA) protocols. The ACTS implementation of DAMA protocols ensures both on-demand and integrated voice, video and data services. Communications services control is also provided by the in-band orderwire but uses only the reference burst and the uplink traffic burst. The performance of the ACTS network control functions have been successfully tested during on-orbit checkout and in various VSAT networks in day to day operations. This paper discusses the network operations and services control performance.

  4. Two sources of meaning in infant communication: preceding action contexts and act-accompanying characteristics.

    PubMed

    Liszkowski, Ulf

    2014-09-19

    How do infants communicate before they have acquired a language? This paper supports the hypothesis that infants possess social-cognitive skills that run deeper than language alone, enabling them to understand others and make themselves understood. I suggested that infants, like adults, use two sources of extralinguistic information to communicate meaningfully and react to and express communicative intentions appropriately. In support, a review of relevant experiments demonstrates, first, that infants use information from preceding shared activities to tailor their comprehension and production of communication. Second, a series of novel findings from our laboratory shows that in the absence of distinguishing information from preceding routines or activities, infants use accompanying characteristics (such as prosody and posture) that mark communicative intentions to extract and transmit meaning. Findings reveal that before infants begin to speak they communicate in meaningful ways by binding preceding and simultaneous multisensory information to a communicative act. These skills are not only a precursor to language, but also an outcome of social-cognitive development and social experience in the first year of life. PMID:25092662

  5. Two sources of meaning in infant communication: preceding action contexts and act-accompanying characteristics

    PubMed Central

    Liszkowski, Ulf

    2014-01-01

    How do infants communicate before they have acquired a language? This paper supports the hypothesis that infants possess social–cognitive skills that run deeper than language alone, enabling them to understand others and make themselves understood. I suggested that infants, like adults, use two sources of extralinguistic information to communicate meaningfully and react to and express communicative intentions appropriately. In support, a review of relevant experiments demonstrates, first, that infants use information from preceding shared activities to tailor their comprehension and production of communication. Second, a series of novel findings from our laboratory shows that in the absence of distinguishing information from preceding routines or activities, infants use accompanying characteristics (such as prosody and posture) that mark communicative intentions to extract and transmit meaning. Findings reveal that before infants begin to speak they communicate in meaningful ways by binding preceding and simultaneous multisensory information to a communicative act. These skills are not only a precursor to language, but also an outcome of social–cognitive development and social experience in the first year of life. PMID:25092662

  6. Control and Non-Payload Communications (CNPC) Prototype Radio - Generation 2 Security Flight Test Report

    NASA Technical Reports Server (NTRS)

    Iannicca, Dennis C.; Ishac, Joseph A.; Shalkhauser, Kurt A.

    2015-01-01

    NASA Glenn Research Center (GRC), in cooperation with Rockwell Collins, is working to develop a prototype Control and Non-Payload Communications (CNPC) radio platform as part of NASA Integrated Systems Research Program's (ISRP) Unmanned Aircraft Systems (UAS) Integration in the National Airspace System (NAS) project. A primary focus of the project is to work with the Federal Aviation Administration (FAA) and industry standards bodies to build and demonstrate a safe, secure, and efficient CNPC architecture that can be used by industry to evaluate the feasibility of deploying a system using these technologies in an operational capacity. GRC has been working in conjunction with these groups to assess threats, identify security requirements, and to develop a system of standards-based security controls that can be applied to the GRC prototype CNPC architecture as a demonstration platform. The proposed security controls were integrated into the GRC flight test system aboard our S-3B Viking surrogate aircraft and several network tests were conducted during a flight on November 15th, 2014 to determine whether the controls were working properly within the flight environment. The flight test was also the first to integrate Robust Header Compression (ROHC) as a means of reducing the additional overhead introduced by the security controls and Mobile IPv6. The effort demonstrated the complete end-to-end secure CNPC link in a relevant flight environment.

  7. Alarm communication and display systems for high security department of energy facilities

    SciTech Connect

    Williams, J.S.

    1987-01-01

    An Alarm Communication and Display System collects alarm data, presents information to security operators, and enables the operators to enter commands affecting security operations; the ultimate goal of the system is to provide rapid assessment of alarms. This paper presents an overview of the architecture and operating principles used for alarm communication and display systems developed for application at several Department of Energy facilities. Although facilities have unique requirements and procedures, the architecture and operating principles of the ACDS presented in this paper have allowed site-specific implementations at several Department of Energy facilities. In addition, this technology has been transferred to other DOE facilities for adaptation to their requirements. Further efforts to enhance ACDS technology include the use of local area network technology to assist in peripheral switching, a distributed CCTV video switching system, and state-of-the-art hardware changes which improve system performance and effectiveness.

  8. Design and Hardware Implementation of a New Chaotic Secure Communication Technique

    PubMed Central

    Xiong, Li; Lu, Yan-Jun; Zhang, Yong-Fang; Zhang, Xin-Guo; Gupta, Parag

    2016-01-01

    In this paper, a scheme for chaotic modulation secure communication is proposed based on chaotic synchronization of an improved Lorenz system. For the first time, the intensity limit and stability of the transmitted signal, the characteristics of broadband and the requirements for accuracy of electronic components are presented by Multisim simulation. In addition, some improvements are made on the measurement method and the proposed experimental circuit in order to facilitate the experiments of chaotic synchronization, chaotic non-synchronization, experiment without signal and experiment with signal. To illustrate the effectiveness of the proposed scheme, some numerical simulations are presented. Then, the proposed chaotic secure communication circuit is implemented through analog electronic circuit, which is characterized by its high accuracy and good robustness. PMID:27548385

  9. Design and Hardware Implementation of a New Chaotic Secure Communication Technique.

    PubMed

    Xiong, Li; Lu, Yan-Jun; Zhang, Yong-Fang; Zhang, Xin-Guo; Gupta, Parag

    2016-01-01

    In this paper, a scheme for chaotic modulation secure communication is proposed based on chaotic synchronization of an improved Lorenz system. For the first time, the intensity limit and stability of the transmitted signal, the characteristics of broadband and the requirements for accuracy of electronic components are presented by Multisim simulation. In addition, some improvements are made on the measurement method and the proposed experimental circuit in order to facilitate the experiments of chaotic synchronization, chaotic non-synchronization, experiment without signal and experiment with signal. To illustrate the effectiveness of the proposed scheme, some numerical simulations are presented. Then, the proposed chaotic secure communication circuit is implemented through analog electronic circuit, which is characterized by its high accuracy and good robustness. PMID:27548385

  10. Information leakage in three-party simultaneous quantum secure direct communication with EPR pairs

    NASA Astrophysics Data System (ADS)

    Wang, Lian-Ying; Chen, Xiu-Bo; Xu, Gang; Yang, Yi-Xian

    2011-04-01

    In 2007, Wang et al. [M. Y. Wang and F. L. Yan, Chin. Phys. Lett. 24 (2007) 2486] proposed a three-party simultaneous quantum secure direct communication (3P-SQSDC) scheme with EPR pairs. Recently, Chong et al. [S. K. Chong and T. Hwang, Opt. Commun. OPTICS-15438 (2010(online))] proposed an enhancement on Wang et al.'s scheme. The communications in Chong et al.'s 3P-SQSDC can be paralleled and thus their scheme has higher efficiency. However, we find that both of the schemes have the information leakage, because the legitimate parties' secret messages have a strong correlation. This kind of security loophole leads to the consequence that any eavesdropper (Eve) can directly conjecture some information about the secrets without any active attack.

  11. Novel optical cryptography using PANDA ring resonator for highly secured communication

    NASA Astrophysics Data System (ADS)

    Putthacharoen, Rattipong; Juleang, Pakorn; Mitatha, Somsak; Yupapin, Preecha P.

    2011-07-01

    We propose a novel method of an optical cryptography using the dark-bright soliton conversion control in a modified add/drop optical filter. By using the control arrangement, the obtained outputs of the dynamic states of dark-bright soliton can be used to form the key suppression for communication security application, in which the key recovery can be obtained by controlling the add/drop filter outputs. The optical cryptography consists of an add/drop filter which is used to generate the encryption and decryption keys from the optical keys (LIP signals). A Mach-Zehnder interferometer is used for multiplexing and de-multiplexing operations. Simulation results obtained shows, that the proposed system can be used to form a high security communication system.

  12. Which verification qubits perform best for secure communication in noisy channel?

    NASA Astrophysics Data System (ADS)

    Sharma, Rishi Dutt; Thapliyal, Kishore; Pathak, Anirban; Pan, Alok Kumar; De, Asok

    2016-04-01

    In secure quantum communication protocols, a set of single qubits prepared using 2 or more mutually unbiased bases or a set of n-qubit (n≥ 2) entangled states of a particular form are usually used to form a verification string which is subsequently used to detect traces of eavesdropping. The qubits that form a verification string are referred to as decoy qubits, and there exists a large set of different quantum states that can be used as decoy qubits. In the absence of noise, any choice of decoy qubits provides equivalent security. In this paper, we examine such equivalence for noisy environment (e.g., in amplitude damping, phase damping, collective dephasing and collective rotation noise channels) by comparing the decoy-qubit-assisted schemes of secure quantum communication that use single-qubit states as decoy qubits with the schemes that use entangled states as decoy qubits. Our study reveals that the single- qubit-assisted scheme performs better in some noisy environments, while some entangled-qubit-assisted schemes perform better in other noisy environments. Specifically, single-qubit-assisted schemes perform better in amplitude damping and phase damping noisy channels, whereas a few Bell-state-based decoy schemes are found to perform better in the presence of the collective noise. Thus, if the kind of noise present in a communication channel (i.e., the characteristics of the channel) is known or measured, then the present study can provide the best choice of decoy qubits required for implementation of schemes of secure quantum communication through that channel.

  13. Spectral-temporal-polarization encoding of photons for multi-user secure quantum communication

    NASA Astrophysics Data System (ADS)

    Donkor, Eric

    2014-05-01

    We describe a Quantum Key Distribution protocol that combines temporal-, spectraland polarization-encoding of photons for secure communication over an interconnected network of users. Temporal encoding is used to identify a user's location or address on the network. Polarization encoding is used to generate private cryptographic key. Polarization encoded information is locally and randomly generated by users and exchanged only over a dedicated secure channel. Spectral encoding allows for the detection of eavesdropping and tampering by a malicious agent. Temporal-spectral signals sent from the network administrator (Alice) to a user are bright light source. On the other hand spectral-temporal signal from a network user (Bob) to the administrator (Alice) are single photons. Signals are sent across the network as ordered light pairs. The ordering format is randomly chosen and are revealed only at the time of key selection between the parties so that a secure one-time cryptographic pad can be generated

  14. Novel Quantum Virtual Private Network Scheme for PON via Quantum Secure Direct Communication

    NASA Astrophysics Data System (ADS)

    Gong, Li-Hua; Liu, Ye; Zhou, Nan-Run

    2013-09-01

    Two quantum secure direct communication (QSDC) protocols with quantum identification (QI) based on passive optical network (PON) architecture are proposed. One QSDC protocol can be implemented between two different optical network units just with simple configurations of PON by optical line terminal when they are in the same virtual private network after optical line terminal performing QI to the optical network units in the given PON architecture. The other QSDC protocol is also implemented between any two legitimated users in the virtual private network but with considerable reduction of workload of the optical line terminal. The security analysis shows that the proposed QSDC schemes with quantum identification are unconditionally secure and allow the legitimate users to exchange their secret information efficiently and to realize a quantum virtual private network in the PON networks ultimately.

  15. Optimized ECC Implementation for Secure Communication between Heterogeneous IoT Devices

    PubMed Central

    Marin, Leandro; Piotr Pawlowski, Marcin; Jara, Antonio

    2015-01-01

    The Internet of Things is integrating information systems, places, users and billions of constrained devices into one global network. This network requires secure and private means of communications. The building blocks of the Internet of Things are devices manufactured by various producers and are designed to fulfil different needs. There would be no common hardware platform that could be applied in every scenario. In such a heterogeneous environment, there is a strong need for the optimization of interoperable security. We present optimized elliptic curve Cryptography algorithms that address the security issues in the heterogeneous IoT networks. We have combined cryptographic algorithms for the NXP/Jennic 5148- and MSP430-based IoT devices and used them to created novel key negotiation protocol. PMID:26343677

  16. Optimized ECC Implementation for Secure Communication between Heterogeneous IoT Devices.

    PubMed

    Marin, Leandro; Pawlowski, Marcin Piotr; Jara, Antonio

    2015-01-01

    The Internet of Things is integrating information systems, places, users and billions of constrained devices into one global network. This network requires secure and private means of communications. The building blocks of the Internet of Things are devices manufactured by various producers and are designed to fulfil different needs. There would be no common hardware platform that could be applied in every scenario. In such a heterogeneous environment, there is a strong need for the optimization of interoperable security. We present optimized elliptic curve Cryptography algorithms that address the security issues in the heterogeneous IoT networks. We have combined cryptographic algorithms for the NXP/Jennic 5148- and MSP430-based IoT devices and used them to created novel key negotiation protocol. PMID:26343677

  17. The Health Insurance Portability & Accountability Act and the practice of dentistry in the United States: system security.

    PubMed

    Chasteen, Joseph E; Murphy, Gretchen; Forrey, Arden; Heid, David

    2004-08-15

    This article reviews the issues related to the Health Insurance Portability & Accountability Act (HIPAA) security rule that apply to dental practice. The security rule specifically addresses individually identifiable health information that is transmitted or maintained in electronic media. System security must be applied to the entire technical infrastructure for the practice environment as well as to the work culture on a daily basis and must be thought of as an enterprise asset. Security refers to all of the policies, procedures, tools, and techniques used to assure that privacy and confidentiality are adequately addressed in a healthcare system. HIPAA requires all covered entities that transmit or maintain electronic health information perform, and document, a risk assessment for security and develop a security plan to address major areas of concern. A self-assessment tool is provided in this article. PMID:15318267

  18. Secure Communications

    NASA Astrophysics Data System (ADS)

    Bellac, Michel Le

    2014-11-01

    The first practical application of quantum physics examined in this book is quantum cryptography. Quantum cryptography is a relatively recent invention (it dates back from the mid 1980s) but I chose it because it allows me to illustrate the fundamental principles with a minimum number of intermediate steps. I shall begin with a short summary of classical cryptography, reviewing briefly the two systems which are currently used today: the secret key system and the public key system. Quantum cryptography is not a new method for dissimulating the meaning of a message, but it allows one to be certain that no spy has accessed it. There exist many quantum cryptography protocols and various experimental devices have been proposed for implementing them. The simplest device is based on polarization, a concept which will be introduced first in the case of of light polarization, and then in that of photon polarization. The use of photon polarization gives the simplest implementation of the protocol proposed in 1984 by Bennett and Brassard, which is known by the acronym formed with their initials, the BB84 protocol.

  19. On a simulation study for reliable and secured smart grid communications

    NASA Astrophysics Data System (ADS)

    Mallapuram, Sriharsha; Moulema, Paul; Yu, Wei

    2015-05-01

    Demand response is one of key smart grid applications that aims to reduce power generation at peak hours and maintain a balance between supply and demand. With the support of communication networks, energy consumers can become active actors in the energy management process by adjusting or rescheduling their electricity usage during peak hours based on utilities pricing incentives. Nonetheless, the integration of communication networks expose the smart grid to cyber-attacks. In this paper, we developed a smart grid simulation test-bed and designed evaluation scenarios. By leveraging the capabilities of Matlab and ns-3 simulation tools, we conducted a simulation study to evaluate the impact of cyber-attacks on demand response application. Our data shows that cyber-attacks could seriously disrupt smart grid operations, thus confirming the need of secure and resilient communication networks for supporting smart grid operations.

  20. ACTS propagation experiment discussion: Ka-band propagation measurements using the ACTS propagation terminal and the CSU-CHILL and Space Communications Technology Center Florida propagation program

    NASA Technical Reports Server (NTRS)

    Bringi, V. N.; Chandrasekar, V.; Mueller, Eugene A.; Turk, Joseph; Beaver, John; Helmken, Henry F.; Henning, Rudy

    1993-01-01

    Papers on Ka-band propagation measurements using the ACTS propagation terminal and the Colorado State University CHILL multiparameter radar and on Space Communications Technology Center Florida Propagation Program are discussed. Topics covered include: microwave radiative transfer and propagation models; NASA propagation terminal status; ACTS channel characteristics; FAU receive only terminal; FAU terminal status; and propagation testbed.

  1. Control and Communication for a Secure and Reconfigurable Power Distribution System

    NASA Astrophysics Data System (ADS)

    Giacomoni, Anthony Michael

    A major transformation is taking place throughout the electric power industry to overlay existing electric infrastructure with advanced sensing, communications, and control system technologies. This transformation to a smart grid promises to enhance system efficiency, increase system reliability, support the electrification of transportation, and provide customers with greater control over their electricity consumption. Upgrading control and communication systems for the end-to-end electric power grid, however, will present many new security challenges that must be dealt with before extensive deployment and implementation of these technologies can begin. In this dissertation, a comprehensive systems approach is taken to minimize and prevent cyber-physical disturbances to electric power distribution systems using sensing, communications, and control system technologies. To accomplish this task, an intelligent distributed secure control (IDSC) architecture is presented and validated in silico for distribution systems to provide greater adaptive protection, with the ability to proactively reconfigure, and rapidly respond to disturbances. Detailed descriptions of functionalities at each layer of the architecture as well as the whole system are provided. To compare the performance of the IDSC architecture with that of other control architectures, an original simulation methodology is developed. The simulation model integrates aspects of cyber-physical security, dynamic price and demand response, sensing, communications, intermittent distributed energy resources (DERs), and dynamic optimization and reconfiguration. Applying this comprehensive systems approach, performance results for the IEEE 123 node test feeder are simulated and analyzed. The results show the trade-offs between system reliability, operational constraints, and costs for several control architectures and optimization algorithms. Additional simulation results are also provided. In particular, the

  2. 77 FR 33753 - Privacy Act of 1974; Department of Homeland Security, U.S. Customs and Border Protection, DHS/CBP...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-07

    ...In accordance with the Privacy Act of 1974, the Department of Homeland Security proposes to establish a new Department of Homeland Security system of records titled, ``Department of Homeland Security, U.S. Customs and Border Protection, DHS/CBP--017 Analytical Framework for Intelligence (AFI) System of Records.'' This system of records will allow the Department of Homeland Security/U.S.......

  3. 17 CFR 270.24f-2 - Registration under the Securities Act of 1933 of certain investment company securities.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... year during which it has publicly offered such securities, file Form 24F-2 (17 CFR 274.24) with the... 17 CFR part 240 to end, revised as of April 1, 1997) if the Successor Issuer: (1) had no assets or... accompanied by the payment of a registration fee with respect to the securities sold during the fiscal year...

  4. Final Report: 03-LW-005 Space-Time Secure Communications for Hostile Environments

    SciTech Connect

    Candy, J V; Poggio, A J; Chambers, D H; Guidry, B L; Robbins, C L; Hertzog, C A; Dowla, F; Burke, G; Kane, R

    2005-10-31

    The development of communications for highly reverberative environments is a major concern for both the private and military sectors whether the application is aimed at the securing a stock order or stalking hostile in a tunnel or cave. Other such environments can range from a hostile urban setting populated with a multitude of buildings and vehicles to the simple complexity of a large number of sound sources that are common in the stock exchange, or military operations in an environment with a topographic features hills, valleys, mountains or even a maze of buried water pipes attempting to transmit information about any chemical anomalies in the water system servicing a city or town. These inherent obstructions cause transmitted signals to reflect, refract and disperse in a multitude of directions distorting both their shape and arrival times at network receiver locations. Imagine troops attempting to communicate on missions in underground caves consisting of a maze of chambers causing multiple echoes with the platoon leader trying to issue timely commands to neutralize terrorists. This is the problem with transmitting information in a complex environment. Waves are susceptible to multiple paths and distortions created by a variety of possible obstructions, which may exist in the particular propagation medium. This is precisely the communications problem we solve using the physics of wave propagation to not only mitigate the noxious effects created by the hostile medium, but also to utilize it in a constructive manner enabling a huge benefit in communications. We employ time-reversal (T/R) communications to accomplish this task. This project is concerned with the development of secure communications techniques that can operate even in the most extreme conditions while maintaining a secure link between host and client stations. We developed an approach based on the concept of time-reversal (T/R) signal processing. In fact, the development of T/R communication

  5. Secure Communication Based on a Hybrid of Chaos and Ica Encryptions

    NASA Astrophysics Data System (ADS)

    Chen, Wei Ching; Yuan, John

    Chaos and independent component analysis (ICA) encryptions are two novel schemes for secure communications. In this paper, a new scheme combining chaos and ICA techniques is proposed to enhance the security level during communication. In this scheme, a master chaotic system is embedded at the transmitter. The message signal is mixed with a chaotic signal and a Gaussian white noise into two mixed signals and then transmitted to the receiver through the public channels. A signal for synchronization is transmitted through another public channel to the receiver where a slave chaotic system is embedded to reproduce the chaotic signal. A modified ICA is used to recover the message signal at the receiver. Since only two of the three transmitted signals contain the information of message signal, a hacker would not be able to retrieve the message signal by using ICA even though all the transmitted signals are intercepted. Spectrum analyses are used to prove that the message signal can be securely hidden under this scheme.

  6. 75 FR 5487 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/U.S. Customs...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-03

    ... of Homeland Security (DHS) published a notice of proposed rulemaking in the Federal Register, 72 FR... Federal Register, 72 FR 43650, August 6, 2007, and comments were invited on both the notice of proposed... ATS from coverage under the legacy Treasury/CS.244 Treasury Enforcement Communication System (66...

  7. Security-enhanced chaos communication with time-delay signature suppression and phase encryption.

    PubMed

    Xue, Chenpeng; Jiang, Ning; Lv, Yunxin; Wang, Chao; Li, Guilan; Lin, Shuqing; Qiu, Kun

    2016-08-15

    A security-enhanced chaos communication scheme with time delay signature (TDS) suppression and phase-encrypted feedback light is proposed, in virtue of dual-loop feedback with independent high-speed phase modulation. We numerically investigate the property of TDS suppression in the intensity and phase space and quantitatively discuss security of the proposed system by calculating the bit error rate of eavesdroppers who try to crack the system by directly filtering the detected signal or by using a similar semiconductor laser to synchronize the link signal and extract the data. The results show that TDS embedded in the chaotic carrier can be well suppressed by properly setting the modulation frequency, which can keep the time delay a secret from the eavesdropper. Moreover, because the feedback light is encrypted, without the accurate time delay and key, the eavesdropper cannot reconstruct the symmetric operation conditions and decode the correct data. PMID:27519064

  8. Experimental demonstration of security-enhanced WDM-PON based on chaotic optical communications

    NASA Astrophysics Data System (ADS)

    Yin, Hongxi; Chen, Xiaolei; Yue, Hehe; Zhao, Qingchun; Hao, Yang; Wu, Chenguang; Zhao, Nan

    2015-08-01

    The message-decryption process of subtracting chaotic synchronization carrier from receiving signal is explained by modeling and numerically solving the rate equations for semiconductor lasers. An experimental system of wavelength division multiplexing passive optical network (WDM-PON) based on chaotic-light secure communications is first built up. The bidirectional transmissions of downstream and upstream data are experimentally realized with only two lasers and a single wavelength channel in a WDM fiber-optic link. When the data rate is 1.25 Gb/s, the secure transmission distance can be up to 11 km with SSMF of G.652. After sampling and decision, the BER of the recovered messages is calculated to be approximately 1×10-4.

  9. Advanced Communication Technology Satellite (ACTS) Multibeam Antenna On-Orbit Performance

    NASA Technical Reports Server (NTRS)

    1995-01-01

    The NASA Lewis Research Center's Advanced Communication Technology Satellite (ACTS) was launched in September 1993. ACTS introduced several new technologies, including a multibeam antenna (MBA) operating at extremely short wavelengths never before used in communications. This antenna, which has both fixed and rapidly reconfigurable high-energy spot beams (150 miles in diameter), serves users equipped with small antenna terminals. Extensive structural and thermal analyses have been performed for simulating the ACTS MBA on-orbit performance. The results show that the reflector surfaces (mainly the front subreflector), antenna support assembly, and metallic surfaces on the spacecraft body will be distorted because of the thermal effects of varying solar heating, which degrade the ACTS MBA performance. Since ACTS was launched, a number of evaluations have been performed to assess MBA performance in the space environment. For example, the on-orbit performance measurements found systematic environmental disturbances to the MBA beam pointing. These disturbances were found to be imposed by the attitude control system, antenna and spacecraft mechanical alignments, and on-orbit thermal effects. As a result, the MBA may not always exactly cover the intended service area. In addition, the on-orbit measurements showed that antenna pointing accuracy is the performance parameter most sensitive to thermal distortions on the front subreflector surface and antenna support assemblies. Several compensation approaches were tested and evaluated to restore on-orbit pointing stability. A combination of autotrack (75 percent of the time) and Earth sensor control (25 percent of the time) was found to be the best way to compensate for antenna pointing error during orbit. This approach greatly minimizes the effects of thermal distortions on antenna beam pointing.

  10. Hardware implementation of Lorenz circuit systems for secure chaotic communication applications.

    PubMed

    Chen, Hsin-Chieh; Liau, Ben-Yi; Hou, Yi-You

    2013-01-01

    This paper presents the synchronization between the master and slave Lorenz chaotic systems by slide mode controller (SMC)-based technique. A proportional-integral (PI) switching surface is proposed to simplify the task of assigning the performance of the closed-loop error system in sliding mode. Then, extending the concept of equivalent control and using some basic electronic components, a secure communication system is constructed. Experimental results show the feasibility of synchronizing two Lorenz circuits via the proposed SMC.  PMID:23429512

  11. Chaotic synchronization based on nonlinear state-observer and its application in secure communication

    NASA Astrophysics Data System (ADS)

    Chen, Ming-Jie; Li, Dian-Pu; Zhang, Ai-Jun

    2004-06-01

    Chaotic synchronization is a branch of chaotic control. Nowadays, the research and application of chaotic synchronization have become a hot topic and one of the development directions is for the research on chaos. In this paper, a universal nonlinear state-observer is presented for a class of universal chaotic systems to realize the chaotic synchronization, according to the theory of state-observer in the modern control theory. And theoretic analysis and simulation results have illustrated the validity of the approach. Moreover, the approach of synchronization proposed in this paper is very easy, flexible and universal with high synchronization precision. When the approach is applied to secure communication, the results are satisfying.

  12. Multiparty controlled quantum secure direct communication based on quantum search algorithm

    NASA Astrophysics Data System (ADS)

    Kao, Shih-Hung; Hwang, Tzonelih

    2013-12-01

    In this study, a new controlled quantum secure direct communication (CQSDC) protocol using the quantum search algorithm as the encoding function is proposed. The proposed protocol is based on the multi-particle Greenberger-Horne-Zeilinger entangled state and the one-step quantum transmission strategy. Due to the one-step transmission of qubits, the proposed protocol can be easily extended to a multi-controller environment, and is also free from the Trojan horse attacks. The analysis shows that the use of quantum search algorithm in the construction of CQSDC appears very promising.

  13. Efficient Quantum Secure Direct Communication Using the Orbital Angular Momentum of Single Photons

    NASA Astrophysics Data System (ADS)

    Jian, Zhuo-Ru; Jin, Guang-Sheng; Wang, Tie-Jun

    2016-03-01

    Quantum secure direct communication (QSDC) is to transmit information directly through quantum channels without generating secret keys. The efficiencies of QSDC rely on the capacity of qubits. Exploiting orbital angular momentum of single photons, we proposed a high-capacity one-time pad QSDC protocol. The information is encoded on the Hermite-Gauss mode and transmitted directly on the Laguerre-Gauss mode of the photon pluses. The proposed system provides a high coding space, and the proposed protocol is robust against collective-dephasing channel noise.

  14. Optical code division multiple access secure communications systems with rapid reconfigurable polarization shift key user code

    NASA Astrophysics Data System (ADS)

    Gao, Kaiqiang; Wu, Chongqing; Sheng, Xinzhi; Shang, Chao; Liu, Lanlan; Wang, Jian

    2015-09-01

    An optical code division multiple access (OCDMA) secure communications system scheme with rapid reconfigurable polarization shift key (Pol-SK) bipolar user code is proposed and demonstrated. Compared to fix code OCDMA, by constantly changing the user code, the performance of anti-eavesdropping is greatly improved. The Pol-SK OCDMA experiment with a 10 Gchip/s user code and a 1.25 Gb/s user data of payload has been realized, which means this scheme has better tolerance and could be easily realized.

  15. Experimental realization of a highly secure chaos communication under strong channel noise

    NASA Astrophysics Data System (ADS)

    Ye, Weiping; Dai, Qionglin; Wang, Shihong; Lu, Huaping; Kuang, Jinyu; Zhao, Zhenfeng; Zhu, Xiangqing; Tang, Guoning; Huang, Ronghuai; Hu, Gang

    2004-09-01

    A one-way coupled spatiotemporally chaotic map lattice is used to construct cryptosystem. With the combinatorial applications of both chaotic computations and conventional algebraic operations, our system has optimal cryptographic properties much better than the separative applications of known chaotic and conventional methods. We have realized experiments to practice duplex voice secure communications in realistic Wired Public Switched Telephone Network by applying our chaotic system and the system of Advanced Encryption Standard (AES), respectively, for cryptography. Our system can work stably against strong channel noise when AES fails to work.

  16. Disclosure Control of Natural Language Information to Enable Secure and Enjoyable Communication over the Internet

    NASA Astrophysics Data System (ADS)

    Kataoka, Haruno; Utsumi, Akira; Hirose, Yuki; Yoshiura, Hiroshi

    Disclosure control of natural language information (DCNL), which we are trying to realize, is described. DCNL will be used for securing human communications over the internet, such as through blogs and social network services. Before sentences in the communications are disclosed, they are checked by DCNL and any phrases that could reveal sensitive information are transformed or omitted so that they are no longer revealing. DCNL checks not only phrases that directly represent sensitive information but also those that indirectly suggest it. Combinations of phrases are also checked. DCNL automatically learns the knowledge of sensitive phrases and the suggestive relations between phrases by using co-occurrence analysis and Web retrieval. The users' burden is therefore minimized, i.e., they do not need to define many disclosure control rules. DCNL complements the traditional access control in the fields where reliability needs to be balanced with enjoyment and objects classes for the access control cannot be predefined.

  17. Communication

    NASA Technical Reports Server (NTRS)

    Griner, James

    2010-01-01

    NASA s communication work for the UAS Command and Control area will build upon work currently being conducted under NASA Recovery Act funds. Communication portions of UAS NextGen ConOps, Stateof- the-Art assessment, and Gap Analysis. Preliminary simulations for UAS CNPC link scalability assessment. Surrogate UAS aircraft upgrades. This work will also leverage FY10 in-guide funding for communication link model development. UAS are currently managed through exceptions and are operating using DoD frequencies for line-of-sight (LOS) and satellite-based communications links, low-power LOS links in amateur bands, or unlicensed Instrument/Scientific/Medical (ISM) frequencies. None of these frequency bands are designated for Safety and Regularity of Flight. No radio-frequency (RF) spectrum has been allocated by the International Telecommunications Union (ITU) specifically for UAS command and control links, for either LOS or Beyond LOS (BLOS) communication.

  18. 75 FR 75502 - Order Extending and Modifying Temporary Exemptions Under the Securities Exchange Act of 1934 in...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-03

    ... Nos. 60372 (Jul. 23, 2009), 74 FR 37748 (Jul. 29, 2009) and 61973 (Apr. 23, 2010), 75 FR 22656 (Apr...); Securities Exchange Act Release Nos. 60373 (Jul. 23, 2009), 74 FR 37740 (Jul. 29, 2009) and 61975 (Apr. 23, 2010), 75 FR 22641 (Apr. 29, 2010) (temporary exemptions in connection with CDS clearing by...

  19. 76 FR 39963 - Order Pursuant to Section 36 of the Securities Exchange Act of 1934 Granting Temporary Exemptions...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-07

    ...), 76 FR 32880 (June 7, 2011) (proposing product definitions contained in Title VII of the Dodd-Frank..., 2011), 76 FR 14472 (March 16, 2011) (File No. S7-08-11) (the ``Clearing Agency Proposing Release''). \\11\\ Securities Exchange Act Release No. 64678 (June 15, 2011) 76 FR 36287 (June 22, 2011) (File...

  20. Energy Market and Economic Impacts of S.2191, the Lieberman-Warner Climate Security Act of 2007

    EIA Publications

    2008-01-01

    This report responds to a request from Senators Lieberman and Warner for an analysis of S.2191, the Lieberman-Warner Climate Security Act of 2007. S.2191 is a complex bill regulating emissions of greenhouse gases through market- based mechanisms, energy efficiency programs, and economic incentives.

  1. Impacts of a 25% Renewable Electricity Standard as Proposed in the American Clean Energy and Security Act Discussion Draft

    EIA Publications

    2009-01-01

    This report responds to requests from Chairman Edward Markey, for an analysis of a 25% federal renewable electricity standard (RES). The RES proposal analyzed in this report is included in the discussion draft of broader legislation, the American Clean Energy and Security Act (ACESA) of 2009, issued on the Energy and Commerce Committee website at the end of March 2009.

  2. Energy Market and Economic Impacts of H.R. 2454, the American Clean Energy and Security Act of 2009

    EIA Publications

    2009-01-01

    This report responds to a request from Chairman Henry Waxman and Chairman Edward Markey for an analysis of H.R. 2454, the American Clean Energy and Security Act of 2009 (ACESA). ACESA, as passed by the House of Representatives on June 26, 2009, is a complex bill that regulates emissions of greenhouse gases through market-based mechanisms, efficiency programs, and economic incentives.

  3. 77 FR 15148 - Order Granting an Application of BF Enterprises, Inc. Under the Securities Exchange Act of 1934

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-14

    ... COMMISSION Order Granting an Application of BF Enterprises, Inc. Under the Securities Exchange Act of 1934 March 8, 2012. I BF Enterprises, Inc. (``BF Enterprises'' or the ``company'') has filed an application... investors.'' \\1\\ 15 U.S.C. 78l(h). \\2\\ 15 U.S.C. 78l(g). In its application, BF Enterprises states that...

  4. An Experimental Realization of a Chaos-Based Secure Communication Using Arduino Microcontrollers

    PubMed Central

    Zapateiro De la Hoz, Mauricio; Acho, Leonardo; Vidal, Yolanda

    2015-01-01

    Security and secrecy are some of the important concerns in the communications world. In the last years, several encryption techniques have been proposed in order to improve the secrecy of the information transmitted. Chaos-based encryption techniques are being widely studied as part of the problem because of the highly unpredictable and random-look nature of the chaotic signals. In this paper we propose a digital-based communication system that uses the logistic map which is a mathematically simple model that is chaotic under certain conditions. The input message signal is modulated using a simple Delta modulator and encrypted using a logistic map. The key signal is also encrypted using the same logistic map with different initial conditions. In the receiver side, the binary-coded message is decrypted using the encrypted key signal that is sent through one of the communication channels. The proposed scheme is experimentally tested using Arduino shields which are simple yet powerful development kits that allows for the implementation of the communication system for testing purposes. PMID:26413563

  5. An Experimental Realization of a Chaos-Based Secure Communication Using Arduino Microcontrollers.

    PubMed

    Zapateiro De la Hoz, Mauricio; Acho, Leonardo; Vidal, Yolanda

    2015-01-01

    Security and secrecy are some of the important concerns in the communications world. In the last years, several encryption techniques have been proposed in order to improve the secrecy of the information transmitted. Chaos-based encryption techniques are being widely studied as part of the problem because of the highly unpredictable and random-look nature of the chaotic signals. In this paper we propose a digital-based communication system that uses the logistic map which is a mathematically simple model that is chaotic under certain conditions. The input message signal is modulated using a simple Delta modulator and encrypted using a logistic map. The key signal is also encrypted using the same logistic map with different initial conditions. In the receiver side, the binary-coded message is decrypted using the encrypted key signal that is sent through one of the communication channels. The proposed scheme is experimentally tested using Arduino shields which are simple yet powerful development kits that allows for the implementation of the communication system for testing purposes. PMID:26413563

  6. Frequency spectrum might act as communication code between retina and visual cortex I

    PubMed Central

    Yang, Xu; Gong, Bo; Lu, Jian-Wei

    2015-01-01

    AIM To explore changes and possible communication relationship of local potential signals recorded simultaneously from retina and visual cortex I (V1). METHODS Fourteen C57BL/6J mice were measured with pattern electroretinogram (PERG) and pattern visually evoked potential (PVEP) and fast Fourier transform has been used to analyze the frequency components of those signals. RESULTS The amplitude of PERG and PVEP was measured at about 36.7 µV and 112.5 µV respectively and the dominant frequency of PERG and PVEP, however, stay unchanged and both signals do not have second, or otherwise, harmonic generation. CONCLUSION The results suggested that retina encodes visual information in the way of frequency spectrum and then transfers it to primary visual cortex. The primary visual cortex accepts and deciphers the input visual information coded from retina. Frequency spectrum may act as communication code between retina and V1. PMID:26682156

  7. Information Leakage Problem in Efficient Bidirectional Quantum Secure Direct Communication with Single Photons in Both Polarization and Spatial-Mode Degrees of Freedom

    NASA Astrophysics Data System (ADS)

    Liu, Zhi-Hao; Chen, Han-Wu; Liu, Wen-Jie

    2016-06-01

    The information leakage problem in the efficient bidirectional quantum secure direct communication protocol with single photons in both polarization and spatial-mode degrees of freedom is pointed out. Next, a way to revise this protocol to a truly secure one is given. We hope people pay more attention to the information leakage problem in order to design truly secure quantum communication protocols.

  8. High-speed image transmission via the Advanced Communication Technology Satellite (ACTS)

    NASA Astrophysics Data System (ADS)

    Bazzill, Todd M.; Huang, H. K.; Thoma, George R.; Long, L. Rodney; Gill, Michael J.

    1996-05-01

    We are developing a wide area test bed network using the Advanced Communication Technology Satellite (ACTS) from NASA for high speed medical image transmission. The two test sites are the University of California, San Francisco, and the National Library of Medicine. The first phase of the test bed runs over a T1 link (1.544 Mbits/sec) using a Very Small Aperture Terminal. The second phase involves the High Data Rate Terminal via an ATM OC 3C (155 Mbits/sec) connection. This paper describes the experimental set up and some preliminary results from phase 1.

  9. Cryptanalysis and Improvement on "Robust EPR-Pairs-Based Quantum Secure Communication with Authentication Resisting Collective Noise"

    NASA Astrophysics Data System (ADS)

    Yue, Qiu-Ling; Yu, Chao-Hua; Liu, Bin; Wang, Qing-Le

    2016-05-01

    Recently, Chang et al. [Sci Chin-Phys Mech Astron. 57(10), 1907-1912, 2014] proposed two robust quantum secure communication protocols with authentication based on Einstein-Podolsky-Rosen (EPR) pairs, which can resist collective noise. In this paper, we analyze the security of their protocols, and show that there is a kind of security flaw in their protocols. By a kind of impersonation attack, the eavesdropper can obtain half of the message on average. Furthermore, an improved method of their protocols is proposed to close the security loophole.

  10. Welfare, Liberty, and Security for All? U.S. Sex Education Policy and the 1996 Title V Section 510 of the Social Security Act.

    PubMed

    Lerner, Justin E; Hawkins, Robert L

    2016-07-01

    When adolescents delay (meaning they wait until after middle school) engaging in sexual intercourse, they use condoms at higher rates and have fewer sexual partners than those who have sex earlier, thus resulting in a lower risk for unintended pregnancies and sexually transmitted infections. The 1996 Section 510 of Title V of the Social Security Act (often referred to as A-H) is a policy that promotes abstinence-only-until-marriage education (AOE) within public schools. Using Stone's (2012) policy analysis framework, this article explores how A-H limits welfare, liberty, and security among adolescents due to the poor empirical outcomes of AOE policy. We recommend incorporating theory-informed comprehensive sex education in addition to theory-informed abstinence education that utilizes Fishbein and Ajzen's (2010) reasoned action model within schools in order to begin to address adolescent welfare, liberty, and security. PMID:27098762

  11. A Non-symmetric Digital Image Secure Communication Scheme Based on Generalized Chaos Synchronization System

    NASA Astrophysics Data System (ADS)

    Zhang, Xiao-Hong; Min, Le-Quan

    2005-12-01

    Based on a generalized chaos synchronization system and a discrete Sinai map, a non-symmetric true color (RGB) digital image secure communication scheme is proposed. The scheme first changes an ordinary RGB digital image with 8 bits into unrecognizable disorder codes and then transforms the disorder codes into an RGB digital image with 16 bits for transmitting. A receiver uses a non-symmetric key to verify the authentication of the received data origin, and decrypts the ciphertext. The scheme can encrypt and decrypt most formatted digital RGB images recognized by computers, and recover the plaintext almost without any errors. The scheme is suitable to be applied in network image communications. The analysis of the key space, sensitivity of key parameters, and correlation of encrypted images imply that this scheme has sound security. The project supported by National Natural Science Foundation of China under Grant Nos. 60074034 and 70271068, the Foundation for University Key Teachers, and the Research Fund for the Doctoral Program of Higher Education under Grant No. 20020008004 by the Ministry of Education of China

  12. Secure Communications in High Speed Fiber Optical Networks Using Code Division Multiple Access (CDMA) Transmission

    SciTech Connect

    Han, I; Bond, S; Welty, R; Du, Y; Yoo, S; Reinhardt, C; Behymer, E; Sperry, V; Kobayashi, N

    2004-02-12

    This project is focused on the development of advanced components and system technologies for secure data transmission on high-speed fiber optic data systems. This work capitalizes on (1) a strong relationship with outstanding faculty at the University of California-Davis who are experts in high speed fiber-optic networks, (2) the realization that code division multiple access (CDMA) is emerging as a bandwidth enhancing technique for fiber optic networks, (3) the realization that CDMA of sufficient complexity forms the basis for almost unbreakable one-time key transmissions, (4) our concepts for superior components for implementing CDMA, (5) our expertise in semiconductor device processing and (6) our Center for Nano and Microtechnology, which is where the majority of the experimental work was done. Here we present a novel device concept, which will push the limits of current technology, and will simultaneously solve system implementation issues by investigating new state-of-the-art fiber technologies. This will enable the development of secure communication systems for the transmission and reception of messages on deployed commercial fiber optic networks, through the CDMA phase encoding of broad bandwidth pulses. CDMA technology has been developed as a multiplexing technology, much like wavelength division multiplexing (WDM) or time division multiplexing (TDM), to increase the potential number of users on a given communication link. A novel application of the techniques created for CDMA is to generate secure communication through physical layer encoding. Physical layer encoding devices are developed which utilize semiconductor waveguides with fast carrier response times to phase encode spectral components of a secure signal. Current commercial technology, most commonly a spatial light modulator, allows phase codes to be changed at rates of only 10's of Hertz ({approx}25ms response). The use of fast (picosecond to nanosecond) carrier dynamics of semiconductors, as

  13. Faithful deterministic secure quantum communication and authentication protocol based on hyperentanglement against collective noise

    NASA Astrophysics Data System (ADS)

    Chang, Yan; Zhang, Shi-Bin; Yan, Li-Li; Han, Gui-Hua

    2015-08-01

    Higher channel capacity and security are difficult to reach in a noisy channel. The loss of photons and the distortion of the qubit state are caused by noise. To solve these problems, in our study, a hyperentangled Bell state is used to design faithful deterministic secure quantum communication and authentication protocol over collective-rotation and collective-dephasing noisy channel, which doubles the channel capacity compared with using an ordinary Bell state as a carrier; a logical hyperentangled Bell state immune to collective-rotation and collective-dephasing noise is constructed. The secret message is divided into several parts to transmit, however the identity strings of Alice and Bob are reused. Unitary operations are not used. Project supported by the National Natural Science Foundation of China (Grant No. 61402058), the Science and Technology Support Project of Sichuan Province, China (Grant No. 2013GZX0137), the Fund for Young Persons Project of Sichuan Province, China (Grant No. 12ZB017), and the Foundation of Cyberspace Security Key Laboratory of Sichuan Higher Education Institutions, China (Grant No. szjj2014-074).

  14. Bidirectional controlled quantum teleportation and secure direct communication using five-qubit entangled state

    NASA Astrophysics Data System (ADS)

    Li, Yuan-hua; Li, Xiao-lan; Sang, Ming-huang; Nie, Yi-you; Wang, Zi-sheng

    2013-12-01

    A scheme is presented to implement bidirectional controlled quantum teleportation (QT) by using a five-qubit entangled state as a quantum channel, where Alice may transmit an arbitrary single qubit state called qubit A to Bob and at the same time, Bob may also transmit an arbitrary single qubit state called qubit B to Alice via the control of the supervisor Charlie. Based on our channel, we explicitly show how the bidirectional controlled QT protocol works. By using this bidirectional controlled teleportation, espcially, a bidirectional controlled quantum secure direct communication (QSDC) protocol, i.e., the so-called controlled quantum dialogue, is further investigated. Under the situation of insuring the security of the quantum channel, Alice (Bob) encodes a secret message directly on a sequence of qubit states and transmits them to Bob (Alice) supervised by Charlie. Especially, the qubits carrying the secret message do not need to be transmitted in quantum channel. At last, we show this QSDC scheme may be determinate and secure.

  15. 17 CFR 239.24 - Form N-5, form for registration of small business investment company under the Securities Act of...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... Register citations affecting Form N-5, see the List of CFR Sections Affected, which appears in the Finding... registration of small business investment company under the Securities Act of 1933 and the Investment Company... N-5, form for registration of small business investment company under the Securities Act of 1933...

  16. 17 CFR 239.24 - Form N-5, form for registration of small business investment company under the Securities Act of...

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... Register citations affecting Form N-5, see the List of CFR Sections Affected, which appears in the Finding... registration of small business investment company under the Securities Act of 1933 and the Investment Company... N-5, form for registration of small business investment company under the Securities Act of 1933...

  17. 17 CFR 239.24 - Form N-5, form for registration of small business investment company under the Securities Act of...

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... Register citations affecting Form N-5, see the List of CFR Sections Affected, which appears in the Finding... registration of small business investment company under the Securities Act of 1933 and the Investment Company... N-5, form for registration of small business investment company under the Securities Act of 1933...

  18. 17 CFR 239.24 - Form N-5, form for registration of small business investment company under the Securities Act of...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Register citations Form N-5, see the List of CFR Sections Affected, which appears in the Finding Aids... registration of small business investment company under the Securities Act of 1933 and the Investment Company... N-5, form for registration of small business investment company under the Securities Act of 1933...

  19. 17 CFR 239.24 - Form N-5, form for registration of small business investment company under the Securities Act of...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... Register citations Form N-5, see the List of CFR Sections Affected, which appears in the Finding Aids... registration of small business investment company under the Securities Act of 1933 and the Investment Company... N-5, form for registration of small business investment company under the Securities Act of 1933...

  20. Student Conduct Administrator Knowledge of the Statistical Reporting Obligations of the Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act

    ERIC Educational Resources Information Center

    DeBowes, Michael Matthew

    2014-01-01

    The "Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act" (the "Clery Act") is a consumer right-to-know law originally passed by Congress in 1900. The law requires colleges and universities receiving federal student aid to publish annually their security-related policies and crime statistics. The…

  1. 12 CFR 250.408 - Short-term negotiable notes of banks not securities under section 32, Banking Act of 1933.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Short-term negotiable notes of banks not securities under section 32, Banking Act of 1933. 250.408 Section 250.408 Banks and Banking FEDERAL RESERVE... securities under section 32, Banking Act of 1933. (a) The Board of Governors has been asked whether...

  2. Proceedings of the Seventeenth NASA Propagation Experimenters Meeting (NAPEX 17) and the Advanced Communications Technology Satellite (ACTS) Propagation Studies Miniworkshop

    NASA Technical Reports Server (NTRS)

    Davarian, Faramaz (Editor)

    1993-01-01

    The NASA Propagation Experimenters Meeting (NAPEX) is convened annually to discuss studies made on radio wave propagation by investors from domestic and international organizations. NAPEX 17 was held on 15 June 1993. The meeting was organized into two technical sessions. The first session was dedicated to slant path propagation studies and experiments. The second session focused on propagation studies for mobile and personal communications. Preceding NAPEX 17, the Advanced Communications Technology Satellite (ACTS) Propagation Studies Miniworkshop was held on 14 June 1993 to review ACTS propagation activities with emphasis on ACTS experiments status and data collection, processing, and exchange.

  3. Interoperability and medical communication using "patient envelope"-based secure messaging.

    PubMed

    Cordonnier, Emmanuel; Croci, Stéphane; Laurent, Jean-François; Gibaud, Bernard

    2003-01-01

    The process of transmitting patient medical information between different healthcare parties involves harmonizing multiple elements: addresses, certificates, patient IDs, communication protocol, message format, and documents/EPR to be exchanged. Beyond the work done at the "information structure level" within CEN TC251, ISO TC215, HL7 and DICOM, it is necessary to focus on the "basic medical communication level." An original approach, based on the "Patient Envelope", has been developed and successfully implemented for Oncology. The operator of the National "Réseau Santé Social" is now proposing a new "secure messaging" service supporting the "Envelope"-based communication. The authors are actively involved in standardization organizations' works, including EDI Santé, DICOM, IETF, and ISO TC 215. The current "envelope" format is compatible with all the e-mail clients. It will evolve to be based on the ebXML envelope, extended with a "medical header" containing HL7/EHRCOM Data Types and C-METS/GPICs. This document describes the results from a 3-year experience, as well as the different steps included in the project. PMID:14663992

  4. PREFACE: 1st International Conference on Sensing for Industry, Control, Communication & Security Technologies

    NASA Astrophysics Data System (ADS)

    Shuja Syed, Ahmed

    2013-12-01

    The 1st International Conference on Sensing for Industry, Control, Communication & Security Technologies (ICSICCST-2013), took place in Karachi, Pakistan, from 24-26 June 2013. It was organized by Indus University, Karachi, in collaboration with HEJ Research Institute of Chemistry, University of Karachi, Karachi. More than 80 abstracts were submitted to the conference and were double blind-reviewed by an international scientific committee. The topics of the Conference were: Video, Image & Voice Sensing Sensing for Industry, Environment, and Health Automation and Controls Laser Sensors and Systems Displays for Innovative Applications Emerging Technologies Unmanned, Robotic, and Layered Systems Sensing for Defense, Homeland Security, and Law Enforcement The title of the conference, 'Sensing for Industry, Control, Communication & Security Technologies' is very apt in capturing the main issues facing the industry of Pakistan and the world. We believe the sensing industry, particularly in Pakistan, is currently at a critical juncture of its development. The future of the industry will depend on how the industry players choose to respond to the challenge of global competition and opportunities arising from strong growth in the Asian region for which we are pleased to note that the conference covered a comprehensive spectrum of issues with an international perspective. This will certainly assist industry players to make informed decisions in shaping the future of the industry. The conference gathered qualified researchers from developed countries like USA, UK, Sweden, Saudi Arabia, China, South Korea and Malaysia etc whose expertise resulting from the research can be drawn upon to build an exploitable area of new technology that has potential Defense, Homeland Security, and Military applicability. More than 250 researchers/students attended the event and made the event great success as the turnout was 100%. An exceptional line-up of speakers spoke at the occasion. We want

  5. 75 FR 60458 - Federal Advisory Committee Act; Advisory Committee on Diversity for Communications in the Digital...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-30

    ... Age AGENCY: Federal Communications Commission. ACTION: Notice of public meeting. SUMMARY: In... Communications Commission's (FCC) Advisory Committee on Diversity for Communications in the Digital Age...: Federal Communications Commission, 445 12th Street, SW., Washington, DC 20554. FOR FURTHER...

  6. Biometric Methods for Secure Communications in Body Sensor Networks: Resource-Efficient Key Management and Signal-Level Data Scrambling

    NASA Astrophysics Data System (ADS)

    Bui, Francis Minhthang; Hatzinakos, Dimitrios

    2007-12-01

    As electronic communications become more prevalent, mobile and universal, the threats of data compromises also accordingly loom larger. In the context of a body sensor network (BSN), which permits pervasive monitoring of potentially sensitive medical data, security and privacy concerns are particularly important. It is a challenge to implement traditional security infrastructures in these types of lightweight networks since they are by design limited in both computational and communication resources. A key enabling technology for secure communications in BSN's has emerged to be biometrics. In this work, we present two complementary approaches which exploit physiological signals to address security issues: (1) a resource-efficient key management system for generating and distributing cryptographic keys to constituent sensors in a BSN; (2) a novel data scrambling method, based on interpolation and random sampling, that is envisioned as a potential alternative to conventional symmetric encryption algorithms for certain types of data. The former targets the resource constraints in BSN's, while the latter addresses the fuzzy variability of biometric signals, which has largely precluded the direct application of conventional encryption. Using electrocardiogram (ECG) signals as biometrics, the resulting computer simulations demonstrate the feasibility and efficacy of these methods for delivering secure communications in BSN's.

  7. High-Fidelity Down-Conversion Source for Secure Communications Using On-Demand Single Photons

    NASA Technical Reports Server (NTRS)

    Roberts, Tony

    2015-01-01

    AdvR, Inc., has built an efficient, fully integrated, waveguide-based source of spectrally uncorrelated photon pairs that will accelerate research and development (R&D) in the emerging field of quantum information science. Key to the innovation is the use of submicron periodically poled waveguides to produce counter propagating photon pairs, which is enabled by AdvR's patented segmented microelectrode poling technique. This novel device will provide a high brightness source of down-conversion pairs with enhanced spectral properties and low attenuation, and it will operate in the visible to the mid-infrared spectral region. A waveguide-based source of spectrally and spatially pure heralded photons will contribute to a wide range of NASA's advanced technology development efforts, including on-demand single photon sources for high-rate spaced-based secure communications.

  8. Synchronization of hyperchaotic harmonics in time-delay systems and its application to secure communication

    NASA Astrophysics Data System (ADS)

    Yaowen, Liu; Guangming, Ge; Hong, Zhao; Yinghai, Wang; Liang, Gao

    2000-12-01

    We present a predictor-feedback method for synchronizing chaotic systems in this paper. By using this method, two structurally equivalent or nonequivalent systems can be synchronized very effectively and quickly. Moreover, the feedback perturbation can be switched on even if trajectories of the two systems are far from each other. Therefore, this method is applicable to real-world experimental systems, especially to some fast experimental systems. The validity of this method is demonstrated by synchronizing hyperchaotic harmonics in a time-delay system. As an application, we introduce how messages can be encoded, transmitted, and decoded using this technique. We suggest taking use of the multistability of time-delay systems to improve the performance of the secure communication.

  9. [Confidentiality in HIV-infection/AIDS--a comment on the Communicable Disease Control Act].

    PubMed

    Frich, J C

    1995-05-10

    The new Communicable Diseases Control Act has come into force in Norway. It makes it compulsory for a physician to warn a third party if it is obvious that a HIV-positive patient, with a high degree of certainty, puts the third party at risk of being infected with HIV. Some philosophers characterize medical confidentiality as an intransigent and absolute obligation, others as a prima facie duty. This article supports the latter view, but the author still argues that strict conditions have to be fulfilled before a physician should consider breaking medical confidentiality: The doctor must try repeatedly to gain the consent or co-operation of the patient involved. Possible negative long-term consequences for the preventive HIV-work support strict medical confidentiality. PMID:7770859

  10. 76 FR 42003 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Transportation...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-18

    ... notice of proposed rulemaking (NPRM) in the Federal Register, 75 FR 7978, February 23, 2010, proposing to... published concurrently in the Federal Register, 75 FR 8096, February 23, 2010, and comments were invited on... of Homeland Security Transportation Security Administration--023 Workplace Violence...

  11. 75 FR 18857 - Privacy Act of 1974; Department of Homeland Security Citizenship and Immigration Services...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-13

    ... security and access policies. Strict controls have been imposed to minimize risk of compromising the... policies, including all applicable DHS automated systems security and access policies. Strict controls have... personal information provided. Docket: For access to the docket to read background documents or...

  12. A Review of State Test Security Laws in 2013. ACT Research Report Series, 2014 (1)

    ERIC Educational Resources Information Center

    Croft, Michelle

    2014-01-01

    Test security has increased in importance in the last few years given high-profile cases of educator misconduct. This paper provides a review of state test security statutes and regulations related to statewide achievement testing using as a framework recent best practices reports by the U.S. Department of Education's National Center for Education…

  13. 17 CFR 230.169 - Exemption from sections 2(a)(10) and 5(c) of the Act for certain communications of regularly...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... factual business information will not be affected by another release or dissemination of a communication...)(10) and 5(c) of the Act for certain communications of regularly released factual business information...) of the Act for certain communications of regularly released factual business information....

  14. 17 CFR 230.169 - Exemption from sections 2(a)(10) and 5(c) of the Act for certain communications of regularly...

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... factual business information will not be affected by another release or dissemination of a communication...)(10) and 5(c) of the Act for certain communications of regularly released factual business information...) of the Act for certain communications of regularly released factual business information....

  15. 17 CFR 230.169 - Exemption from sections 2(a)(10) and 5(c) of the Act for certain communications of regularly...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... factual business information will not be affected by another release or dissemination of a communication...)(10) and 5(c) of the Act for certain communications of regularly released factual business information...) of the Act for certain communications of regularly released factual business information....

  16. 17 CFR 230.169 - Exemption from sections 2(a)(10) and 5(c) of the Act for certain communications of regularly...

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... factual business information will not be affected by another release or dissemination of a communication...)(10) and 5(c) of the Act for certain communications of regularly released factual business information...) of the Act for certain communications of regularly released factual business information....

  17. 17 CFR 230.169 - Exemption from sections 2(a)(10) and 5(c) of the Act for certain communications of regularly...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... factual business information will not be affected by another release or dissemination of a communication...)(10) and 5(c) of the Act for certain communications of regularly released factual business information...) of the Act for certain communications of regularly released factual business information....

  18. Statement of Charles D. Ferris, Chairman, Federal Communications Commission, on H.R. 13015, a Bill to Replace the Communications Act of 1934 with the "Communications Act of 1978" before the subcommittee on Communications of the House Committee on Interstate & Foreign Commerce, July 18, 1978.

    ERIC Educational Resources Information Center

    Ferris, Charles D.

    H.R. 13015, the proposed revision of the Communications Act of 1934, is consistent in many aspects with Federal Communications Commission (FCC) trends toward greater reliance on marketplace forces than on regulation, but some portions of the bill should be reexamined before the final rewrite. First, the new bill would shift from a "public…

  19. PACS image security server

    NASA Astrophysics Data System (ADS)

    Cao, Fei; Huang, H. K.

    2004-04-01

    Medical image security in a PACS environment has become a pressing issue as communications of images increasingly extends over open networks, and hospitals are currently hard-pushed by Health Insurance Portability and Accountability Act (HIPAA) to be HIPPA complaint for ensuring health data security. Other security-related guidelines and technical standards continue bringing to the public attention in healthcare. However, there is not an infrastructure or systematic method to implement and deploy these standards in a PACS. In this paper, we first review DICOM Part15 standard for secure communications of medical images and the HIPAA impacts on PACS security, as well as our previous works on image security. Then we outline a security infrastructure in a HIPAA mandated PACS environment using a dedicated PACS image security server. The server manages its own database of all image security information. It acts as an image Authority for checking and certificating the image origin and integrity upon request by a user, as a secure DICOM gateway to the outside connections and meanwhile also as a PACS operation monitor for HIPAA supporting information.

  20. The Law of Communicable Diseases Act and disclosure to sexual partners among HIV-positive youth

    PubMed Central

    Christiansen, Monica; Lalos, Ann; Johansson, Eva. E.

    2008-01-01

    In Sweden, human immunodeficiency virus (HIV) is included among the venereal diseases covered by the Law of Communicable Diseases Act. HIV-positive (HIV+) people are required to inform their sexual partners about their infection and adopt safe sex behaviours. However, it is unclear how the law is perceived. This study explores how HIV+ youth in Sweden perceive the law, handle their sexuality and disclose their HIV diagnosis to sexual partners. Ten HIV+ women and men between 17 and 24 years of age were recruited from three different HIV infection clinics. These participants were interviewed in depth. The interviews were tape-recorded, transcribed verbatim and analysed according to a grounded theory approach. The core category—cultured to take responsibility—illuminates the informants’ double-edged experiences regarding the law and how they handle disclosure to sexual partners. The legislation implies both support and burden for these HIV+ youth; they feel that they have a great deal of responsibility, sometimes more than they can handle. ‘Switch off lust’, ‘balancing lust, fear and obedience’ and ‘switch off the disease’ are strategies that describe how the informants manage sexuality and disclosure. Young HIV+ people have a difficult time informing partners of their HIV diagnosis and discussing safe sex strategies. These are challenges that health care providers need to take seriously. HIV+ youth need better communication strategies to negotiate safer sex. Staff with extended education on sexuality should be a part of HIV health care. PMID:22639678

  1. The Law of Communicable Diseases Act and disclosure to sexual partners among HIV-positive youth.

    PubMed

    Christiansen, Monica; Lalos, Ann; Johansson, Eva E

    2008-12-01

    In Sweden, human immunodeficiency virus (HIV) is included among the venereal diseases covered by the Law of Communicable Diseases Act. HIV-positive (HIV(+)) people are required to inform their sexual partners about their infection and adopt safe sex behaviours. However, it is unclear how the law is perceived. This study explores how HIV(+) youth in Sweden perceive the law, handle their sexuality and disclose their HIV diagnosis to sexual partners. Ten HIV(+) women and men between 17 and 24 years of age were recruited from three different HIV infection clinics. These participants were interviewed in depth. The interviews were tape-recorded, transcribed verbatim and analysed according to a grounded theory approach. The core category-cultured to take responsibility-illuminates the informants' double-edged experiences regarding the law and how they handle disclosure to sexual partners. The legislation implies both support and burden for these HIV(+) youth; they feel that they have a great deal of responsibility, sometimes more than they can handle. 'Switch off lust', 'balancing lust, fear and obedience' and 'switch off the disease' are strategies that describe how the informants manage sexuality and disclosure. Young HIV(+) people have a difficult time informing partners of their HIV diagnosis and discussing safe sex strategies. These are challenges that health care providers need to take seriously. HIV(+) youth need better communication strategies to negotiate safer sex. Staff with extended education on sexuality should be a part of HIV health care. PMID:22639678

  2. Secure Intra-Body Wireless Communications (SIWiC) System Project

    NASA Technical Reports Server (NTRS)

    Ahmad, Aftab; Doggett, Terrence P.

    2011-01-01

    SIWiC System is a project to investigate, design and implement future wireless networks of implantable sensors in the body. This futuristic project is designed to make use of the emerging and yet-to-emerge technologies, including ultra-wide band (UWB) for wireless communications, smart implantable sensors, ultra low power networking protocols, security and privacy for bandwidth and power deficient devices and quantum computing. Progress in each of these fronts is hindered by the needs of breakthrough. But, as we will see in this paper, these major challenges are being met or will be met in near future. SIWiC system is a network of in-situ wireless devices that are implanted to coordinate sensed data inside the body, such as symptoms monitoring collected internally, or biometric data collected of an outside object from within the intra-body network. One node has the capability of communicating outside the body to send data or alarm to a relevant authority, e.g., a remote physician.

  3. Advanced Communications Technology Satellite (ACTS) Fade Compensation Protocol Impact on Very Small-Aperture Terminal Bit Error Rate Performance

    NASA Technical Reports Server (NTRS)

    Cox, Christina B.; Coney, Thom A.

    1999-01-01

    The Advanced Communications Technology Satellite (ACTS) communications system operates at Ka band. ACTS uses an adaptive rain fade compensation protocol to reduce the impact of signal attenuation resulting from propagation effects. The purpose of this paper is to present the results of an analysis characterizing the improvement in VSAT performance provided by this protocol. The metric for performance is VSAT bit error rate (BER) availability. The acceptable availability defined by communication system design specifications is 99.5% for a BER of 5E-7 or better. VSAT BER availabilities with and without rain fade compensation are presented. A comparison shows the improvement in BER availability realized with rain fade compensation. Results are presented for an eight-month period and for 24 months spread over a three-year period. The two time periods represent two different configurations of the fade compensation protocol. Index Terms-Adaptive coding, attenuation, propagation, rain, satellite communication, satellites.

  4. Modifications to the HIPAA Privacy, Security, Enforcement, and Breach Notification rules under the Health Information Technology for Economic and Clinical Health Act and the Genetic Information Nondiscrimination Act; other modifications to the HIPAA rules.

    PubMed

    2013-01-25

    The Department of Health and Human Services (HHS or ``the Department'') is issuing this final rule to: Modify the Health Insurance Portability and Accountability Act (HIPAA) Privacy, Security, and Enforcement Rules to implement statutory amendments under the Health Information Technology for Economic and Clinical Health Act (``the HITECH Act'' or ``the Act'') to strengthen the privacy and security protection for individuals' health information; modify the rule for Breach Notification for Unsecured Protected Health Information (Breach Notification Rule) under the HITECH Act to address public comment received on the interim final rule; modify the HIPAA Privacy Rule to strengthen the privacy protections for genetic information by implementing section 105 of Title I of the Genetic Information Nondiscrimination Act of 2008 (GINA); and make certain other modifications to the HIPAA Privacy, Security, Breach Notification, and Enforcement Rules (the HIPAA Rules) to improve their workability and effectiveness and to increase flexibility for and decrease burden on the regulated entities. PMID:23476971

  5. Center to Advance, Monitor, and Preserve University Security Safety Act of 2013

    THOMAS, 113th Congress

    Rep. Scott, Robert C. "Bobby" [D-VA-3

    2013-01-23

    02/28/2013 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, And Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  6. Electronic Life Safety and Security Systems Federal Background Check Act of 2013

    THOMAS, 113th Congress

    Rep. Luetkemeyer, Blaine [R-MO-3

    2013-04-09

    04/30/2013 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  7. 75 FR 20844 - Federal Advisory Committee Act; Advisory Committee on Diversity for Communications in the Digital...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-21

    ... Age AGENCY: Federal Communications Commission. ACTION: Notice of public meeting. SUMMARY: In... Communications Commission's (FCC) Advisory Committee on Diversity for Communications in the Digital Age...), 445 12th Street, SW., Washington, DC 20554. FOR FURTHER INFORMATION CONTACT: Barbara Kreisman,...

  8. 77 FR 6113 - Federal Advisory Committee Act; Advisory Committee on Diversity for Communications in the Digital...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-07

    ... Age AGENCY: Federal Communications Commission. ACTION: Notice of public meeting. SUMMARY: In... Communications Commission's (FCC's) Advisory Committee on Diversity for Communications in the Digital Age... telecommunications and related industries. The Committee will be charged with gathering the data and...

  9. 78 FR 39289 - Federal Advisory Committee Act; Advisory Committee on Diversity for Communications in the Digital...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-01

    ... Age AGENCY: Federal Communications Commission. ACTION: Notice of public meeting. SUMMARY: In... Communications Commission's (FCC) Advisory Committee on Diversity for Communications in the Digital Age... telecommunications and related industries. The Committee will be charged with gathering the data and...

  10. 78 FR 21354 - Federal Advisory Committee Act; Advisory Committee on Diversity for Communications in the Digital...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-10

    ... Age AGENCY: Federal Communications Commission. ACTION: Notice of public meeting. SUMMARY: In... Communications Commission's (FCC) Advisory Committee on Diversity for Communications in the Digital Age... telecommunications and related industries. The Committee will be charged with gathering the data and...

  11. 75 FR 70004 - Federal Advisory Committee Act; Advisory Committee on Diversity for Communications in the Digital...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-16

    ... Age AGENCY: Federal Communications Commission. ACTION: Notice of public meeting. SUMMARY: In... Communications Commission's (FCC) Advisory Committee on Diversity for Communications in the Digital Age... Room), 445 12th Street, SW., Washington, DC 20554. FOR FURTHER INFORMATION CONTACT: Barbara...

  12. 75 FR 6031 - Federal Advisory Committee Act; Advisory Committee on Diversity for Communications in the Digital...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-05

    ... Age AGENCY: Federal Communications Commission. ACTION: Notice of public meeting. SUMMARY: In... Communications Commission's (FCC) Advisory Committee on Diversity for Communications in the Digital Age... Meeting Room), 445 12th Street, SW., Washington, DC 20554. FOR FURTHER INFORMATION CONTACT:...

  13. 77 FR 57085 - Federal Advisory Committee Act; Advisory Committee on Diversity for Communications in the Digital...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-17

    ... Age AGENCY: Federal Communications Commission. ACTION: Notice of public meeting. SUMMARY: In... Communications Commission's (FCC) Advisory Committee on Diversity for Communications in the Digital Age... telecommunications and related industries. The Committee will be charged with gathering the data and...

  14. 76 FR 64348 - Federal Advisory Committee Act; Advisory Committee on Diversity for Communications in the Digital...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-18

    ... Age AGENCY: Federal Communications Commission. ACTION: Notice of public meeting. SUMMARY: In... Communications Commission's (FCC) Advisory Committee on Diversity for Communications in the Digital Age... telecommunications and related industries. The Committee will be charged with gathering the data and...

  15. 75 FR 53694 - Federal Advisory Committee Act; Advisory Committee on Diversity for Communications in the Digital...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-01

    ... Age AGENCY: Federal Communications Commission. ACTION: Notice of public meeting. SUMMARY: In... Communications Commission's (FCC) Advisory Committee on Diversity for Communications in the Digital Age... Meeting Room), 445 12th Street, SW., Washington, DC 20554. FOR FURTHER INFORMATION CONTACT:...

  16. 76 FR 55693 - Privacy Act of 1974; Department of Homeland Security National Protection and Programs Directorate...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-08

    ... in the SORN and Notice of Proposed Rulemaking (NPRM) in the Federal Register, 75 FR 69603, on... originally published in the SORN and Notice of Proposed Rulemaking (NPRM) in the Federal Register, 75 FR... Initiative (September 10, 2010, 75 FR 55335). II. Privacy Act The Privacy Act embodies fair...

  17. 75 FR 11191 - Privacy Act of 1974; Retirement of Department of Homeland Security Federal Emergency Management...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-10

    ... Federal Emergency Management Agency U.S. Fire Administration--001 9/11 Heroes Stamp Act of 2001 System of.... Fire Administration (USFA) is giving notice that it proposes to retire DHS/FEMA/USFA--001 9/11 Heroes Stamp Act of 2001 System of Records (70 FR 43218, July 26, 2005). ] This system was...

  18. 78 FR 15722 - Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-12

    ... from 1:00-5:00 p.m. EDT due to a snowstorm predicted for the Mid-Atlantic region on March 6, 2013. The agenda for the meeting remains the same; Working Groups on Next Generation Alerting, E9-1-1 Location..., Botnet Remediation, Alerting Issues Associated with CAP Migration, 9-1-1 Prioritization, and...

  19. 78 FR 10169 - Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-13

    ... hold its final meeting. Working groups Next Generation Alerting, E9-1-1 Location Accuracy, Network... Remediation, Alerting Issues Associated with CAP Migration, 9-1-1 Prioritization, and Consensus Cybersecurity... 6, 2013, from 9:00 a.m. to 1:00 p.m. in the Commission Meeting Room of the Federal...

  20. 78 FR 70551 - Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-26

    .... The November 21, 2013, Federal Register notice is available at http://www.gpo.gov/fdsys/pkg/FR-2013-11... including emergency warning systems, 9-1-1 location accuracy, distributed denial-of-service (DDoS),...