D
Daniel Nelson Heer
Researcher at Alcatel-Lucent
Publications - 13
Citations - 580
Daniel Nelson Heer is an academic researcher from Alcatel-Lucent. The author has contributed to research in topics: Encryption & On-the-fly encryption. The author has an hindex of 8, co-authored 13 publications receiving 580 citations.
Papers
More filters
Patent
Encrypting method and apparatus enabling multiple access for multiple services and multiple transmission modes over a broadband communication network
TL;DR: In this article, the authors proposed an encryption method for data transmission over a broadband multiple access bi-directional hybrid fiber/coax (HFC) network, which is implemented in two subdivisions, a slow but secure software encrypting algorithm, and a fast but less secure hardware encryption algorithm.
Patent
Data encryption security module
TL;DR: In this article, the authors proposed an encryption module, which, in accordance with an aspect of the invention, generates a unique device encryption key (S local ), a cryptographic key formed from a unique identification key and an associated public key (KP id ), and at least one program encryption key, in which the public key is generated as a function of the unique ID key.
Patent
Data encryption key management system
TL;DR: In this paper, the secure management of encryption keys is obtained by preventing external access to the encryption unit and ensuring that the keys do not leave an encryption unit in their original form.
Patent
Electronic identifiers for network terminal devices
Joshua L. Cohen,Cecil A. Dean,Thomas L. du Breuil,Daniel Nelson Heer,David P. Maher,Vance Eugene Poteat,Robert John Rance +6 more
TL;DR: In this article, the authors proposed the generation of electronic identifiers for network interface units connected to a data network for use in detecting unauthorized decryption of encrypted data transmitted over the data network.
Patent
Methods and apparatus for enhanced security expansion of a secret key into a lookup table for improved security for wireless telephone messages
Mark H. Etzel,Robert John Frank,Daniel Nelson Heer,Robert Joseph McNelis,Semyon B. Mizikovsky,Robert John Rance,R. Dale Shipp +6 more
TL;DR: In this article, an enhancement to the use of a tbox function for CMEA encryption is presented, where offsets are used to permute the message for application of tbox functions.