DDJ, November 2001 -- Computer Security

FEATURES

AUDIO WATERMARKING

by Michael Arnold

Digital watermarking is a security technique that provides copy protection, authentication, and more for audio and other forms of information. The approach Michael presents here is based on a statistical algorithm working in the Fourier domain.

DEFECTIVE SIGN-AND-ENCRYPT

by Don Davis

Over the past 25 years, most security protocols have focused on securing network connections, ignoring relatively simple file-encryption problems. Don presents guidelines for avoiding a common security pitfall when combining encryption with digital signatures.

BANNERS & INTERNET PROTOCOLS

by Bruce Schneier and Elizabeth Zwicky

SMTP banners that contain version information can result in security vulnerabilities. Our authors show how to close this hole.

INSIDE eBOOK SECURITY

by Daniel V. Bailey

Daniel reports on Dmitry Sklyarov's analysis of PC-based digital rights management security techniques.

BUILDING DYNAMIC FAIL-OVER JAVA SERVERS

by Chang Sau Sheong

System outage isn't just a hardware problem. The design and implementation of software must be robust and hardy enough to survive failures of all kinds.

UNDERSTANDING PHOTOMOSAICS

by Manuel Lopez Michelone and Marcelo Perez Medel

A photomosaic is a digital image made up of other digital images, pieced together by software.

EXCEPTION HANDLING IN KYLIX

by Eli Boling and Chuck Jazdzewski

Kylix brings Borland's Delphi toolset and environment from Windows to Linux. And one of the most challenging aspects of the port involved exception handling.

PACKETCABLE SECURITY

by Linden deCarmo

The PacketCable Security Specification provides rigorous security standards for cable-based telephony networks.

EMBEDDED SYSTEMS

XML FOR INSTRUMENT CONTROL AND MONITORING

by David Cox

The Instrument Markup Language is an XML dialect designed to aid in the exchange of data and commands with remote instruments.

INTERNET PROGRAMMING

E-MAIL RELAYING

by Robert Kiesling

The rapidly increasing number of e-mail relay packages means interoperability challenges for programmers who need compatibility with existing e-mail software.

PROGRAMMER'S TOOLCHEST

BIOMETRIC SECURITY

by Richard Dale

Biometrics offers a strong authentication alternative to traditional passwords and tokens, and can do so without imposing the burden and cost of application source-code modification.

COLUMNS

PROGRAMMING PARADIGMS

by Michael Swaine

Just because Michael sees conspiracies everywhere, doesn't mean he's fantasizing. Or does it?

C PROGRAMMING

by Al Stevens

If he didn't know before, you can bet Al knows now that Schroeder is the piano player and Linus is the blanket-holder. Al goes on to examine programming issues related to a specific DSP audio problem.

EMBEDDED SPACE

by Ed Nisley

It's no surprise that microcontrollers and other embedded devices are used in life-support systems. But can you really, really trust them?

JAVA Q&A

by Oliver Goldman

Java provides two types of exceptions: checked and unchecked.

ALGORITHM ALLEY

by Jiri Kripac

The algorithm Jiri presents here performs undo/redo for a general network of interconnected objects.

DR. ECCO'S OMNIHEURIST CORNER

by Dennis E. Shasha

Ecco and Liane discover that urban planning in Texas isn't an oxymoron after all.

PROGRAMMER'S BOOKSHELF

by Jack J. Woehr

Jack examines a pair of books that focus on embedded systems: Embedded Controller Hardware Design, by Ken Arnold; and Programming Microcontrollers in C, Second Edition, by

Ted van Sickle.

FORUM

EDITORIAL

by Jonathan Erickson

LETTERS

by you

NEWS & VIEWS

by Shannon Cochran

OF INTEREST

by Della Song

SWAINE'S FLAMES

by Michael Swaine