R
Robert Carl Elander
Researcher at IBM
Publications - 12
Citations - 580
Robert Carl Elander is an academic researcher from IBM. The author has contributed to research in topics: Host (network) & Key (cryptography). The author has an hindex of 7, co-authored 12 publications receiving 580 citations.
Papers
More filters
Patent
Cryptographic communication security for multiple domain networks
William Friedrich Ehrsam,Robert Carl Elander,Stephen M. Matyas,Carl H. W. Meyer,Robert Lowell Powers,Paul Norman Prentice,John Lynn Smith,Walter Leonard Tuchman +7 more
TL;DR: In this paper, a common session key for data transmissions between different domains of a multiple-domain communication network where each domain includes a host system and its associated resources of programs and communication terminals is proposed.
Patent
Cryptographic file security for multiple domain networks
William Friedrich Ehrsam,Stephen M. Matyas,Robert Carl Elander,Richard John Sahulka,Carl H. W. Meyer,Walter Leonard Tuchman +5 more
TL;DR: In this paper, a file security system for data files created at a first host system in one domain and recovered at a second host systems in another domain of a multiple domain network is presented.
Patent
Cryptographic file security for single domain networks
William Friedrich Ehrsam,Robert Carl Elander,Stephen M. Matyas,Carl H. W. Meyer,John Lynn Smith,Walter Leonard Tuchman +5 more
TL;DR: In this paper, a file security system for data files associated with a host data processing system is described. But the file security device is not considered in this paper, as it is assumed that the file keys are stored in the designated storage media.
Patent
Cryptographic application for interbank verification
Robert Carl Elander,Richard Edward Lennon,Stephen M. Matyas,Carl H. W. Meyer,Robert Edward Shuck,Walter Leonard Tuchman +5 more
TL;DR: In this article, the identity verification of a user in a data communication network with a central switch is discussed, where the secret data is first encrypted at the terminal under a transfer-in key for transmission to an associated data processing system.
Patent
Commercial Data Masking
Robert Carl Elander,Christopher J. Holloway,Donald B. Johnson,Michael J. Kelly,An V. Le,Paul G. Lubold,Stephen M. Matyas,James D. Randall,John D. Wilkins +8 more
TL;DR: In this paper, a method and system for the implementation of a weakened privacy channel is described, where the key when used for commercial data masking may be transformed into a key that may be used with the Data Encryption Algorithm.