Show simple item record

dc.contributor.authorArce, Dennis
dc.date.accessioned2016-04-29T21:00:08Zen
dc.date.available2016-04-29T21:00:08Zen
dc.date.issued2002-10en
dc.identifier.issn0884-5123en
dc.identifier.issn0074-9079en
dc.identifier.urihttp://hdl.handle.net/10150/607528en
dc.descriptionInternational Telemetering Conference Proceedings / October 21, 2002 / Town & Country Hotel and Conference Center, San Diego, Californiaen_US
dc.description.abstractNext generation flight termination systems (FTSs) will use digital technologies to verify the authenticity of range safety commands by command receiver-decoders located on each vehicle. This paper will discuss the general principles behind simplex message authentication using a block encryption cipher, and presents examples for demonstration.
dc.description.sponsorshipInternational Foundation for Telemeteringen
dc.language.isoen_USen
dc.publisherInternational Foundation for Telemeteringen
dc.relation.urlhttp://www.telemetry.org/en
dc.rightsCopyright © International Foundation for Telemeteringen
dc.subjectRange Safetyen
dc.subjectFlight Terminationen
dc.subjectAuthenticationen
dc.subjectEncryptionen
dc.subjectBlock Cipheren
dc.titleFLIGHT TERMINATION COMMAND AUTHENTICATION USING BLOCK ENCRYPTIONen_US
dc.typetexten
dc.typeProceedingsen
dc.contributor.departmentBourne Technologies, Inc.en
dc.identifier.journalInternational Telemetering Conference Proceedingsen
dc.description.collectioninformationProceedings from the International Telemetering Conference are made available by the International Foundation for Telemetering and the University of Arizona Libraries. Visit http://www.telemetry.org/index.php/contact-us if you have questions about items in this collection.en
refterms.dateFOA2018-05-18T11:04:26Z
html.description.abstractNext generation flight termination systems (FTSs) will use digital technologies to verify the authenticity of range safety commands by command receiver-decoders located on each vehicle. This paper will discuss the general principles behind simplex message authentication using a block encryption cipher, and presents examples for demonstration.


Files in this item

Thumbnail
Name:
ITC_2002_02-17-3.pdf
Size:
111.9Kb
Format:
PDF

This item appears in the following Collection(s)

Show simple item record