Local Network Cryptosystem Architecture: Access Control

  • Thomas A. Berson
Conference paper


A mechanism which uses keyed verification sequences at the link layer of protocol to control access to data transport facilities of a local area network will be described.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [1]
    K.J. Biba, “LocalNet(tm): a digital communications network for broadband coaxial cable,” Proc. IEEE CompCon, ( Feb. 1981 ), pp. 59–63.Google Scholar
  2. [2]
    T.A. Berson and R.K. Bauer, “Local network cryptosystem architecture,” Proc. IEEE CompCon, (Feb. 1982), pp. 138–143.Google Scholar
  3. [3]
    Data Encryption Standard, FIPS PUB 46, U.S. Department of Commerce, National Bureau of Standards, (January, 1977).Google Scholar
  4. [4]
    H. Beker and F. Piper, Cipher Systems, Northwood Books, London (1982).Google Scholar
  5. [5]
    L. Blum, M. Blum and M. Shub, “A simple secure pseudo-random number generator,” Memorandum UCB/ERL M82/65, Electronics Research Laboratory, College of Engineering, University of California, Berkeley (Sept. 1982).Google Scholar

Copyright information

© Springer Science+Business Media New York 1983

Authors and Affiliations

  • Thomas A. Berson
    • 1
  1. 1.Sytek, Inc.Mountain ViewUSA

Personalised recommendations