Learn More
  • J. Black
  • 2005
Often when two parties communicate over a network, they have two main security goals: privacy and authentication. In fact, there is compelling evidence that one should never use encryption without also providing authentication [8, 14]. Many solutions for the privacy and authentication problems have existed for decades, and the traditional approach to(More)
  • J.R. Black
  • 2004
This paper focuses on recently implemented technological solutions that improve the state of video surveillance in the complex aviation environment from reactive to proactive. Highlighted solutions include automated "Video Pursuit", integrating video surveillance within military style "Command and Control" software, seamless integration between video and(More)
  • 1