scispace - formally typeset
Open AccessBook

Secrecy, authentication, and public key systems

Reads0
Chats0
TLDR
An automatic control system for a tube expander tool of the type having a hydraulically powered rotary tool which is advanced and retracted by a reversible linear motor to maintain a desired constant load and to prevent overloading.
Abstract
An automatic control system for a tube expander tool of the type having a hydraulically powered rotary tool which is advanced and retracted by a reversible linear motor. Operation of automatic cycling is initiated by a manual control whereas axial movement of the tool can be interrupted at any time by operating a hold control while rotation of the tool continues as long as necessary to iron out excess metal or to reposition the tube in the bore should this be desirable. The tool is maintained under constant load at all times by load sensor means in the tool advancing circuit and operable to vary the rate of tool advance to maintain a desired constant load and to prevent overloading. Accordingly, the rate of tool advance varies inversely as the load on the tool.

read more

Citations
More filters
Proceedings ArticleDOI

Networking named content

TL;DR: Content-Centric Networking (CCN) is presented, which treats content as a primitive - decoupling location from identity, security and access, and retrieving content by name, using new approaches to routing named content.
Journal ArticleDOI

A digital signature scheme secure against adaptive chosen-message attacks

TL;DR: A digital signature scheme based on the computational difficulty of integer factorization possesses the novel property of being robust against an adaptive chosen-message attack: an adversary who receives signatures for messages of his choice cannot later forge the signature of even a single additional message.
Journal ArticleDOI

Networking named content

TL;DR: Content-Centric Networking (CCN) is presented which uses content chunks as a primitive---decoupling location from identity, security and access, and retrieving chunks of content by name, and simultaneously achieves scalability, security, and performance.
Proceedings ArticleDOI

Protocols for Public Key Cryptosystems

TL;DR: Several protocols for public key distribution and for digital signatures are briefly compared with each other and with the conventional alternative.
Proceedings ArticleDOI

Universal one-way hash functions and their cryptographic applications

TL;DR: A Universal One-Way Hash Function family is defined, a new primitive which enables the compression of elements in the function domain and it is proved constructively that universal one- way hash functions exist if any 1-1 one-way functions exist.