2000 26.11 2002

Vol.26 n°11 (#330) november 2001

(ddj_2001_11.jpg)

p.8 EDITORIAL

[author : Jonathan Erickson] #Edito

TABLE OF CONTENTS

FEATURES

p.21 AUDIO WATERMARKING

[author : Michael Arnold]

Digital watermarking is a security technique that provides copy protection, authentication, and more for audio and other forms of information. The approach Michael presents here is based on a statistical algorithm working in the Fourier domain.

p.30 DEFECTIVE SIGN-AND-ENCRYPT

[author : Don Davis]

Over the past 25 years, most security protocols have focused on securing network connections, ignoring relatively simple file-encryption problems. Don presents guidelines for avoiding a common security pitfall when combining encryption with digital signatures.

p.38 BANNERS & INTERNET PROTOCOLS

[author : Bruce Schneier and Elizabeth Zwicky]

SMTP banners that contain version information can result in security vulnerabilities. Our authors show how to close this hole.

p.42 INSIDE eBOOK SECURITY

[author : Daniel V. Bailey]

Daniel reports on Dmitry Sklyarov's analysis of PC-based digital rights management security techniques.

p.46 BUILDING DYNAMIC FAIL-OVER JAVA SERVERS

[author : Chang Sau Sheong]

System outage isn't just a hardware problem. The design and implementation of software must be robust and hardy enough to survive failures of all kinds.

p.58 UNDERSTANDING PHOTOMOSAICS

[author : Manuel Lopez Michelone and Marcelo Perez Medel]

A photomosaic is a digital image made up of other digital images, pieced together by software.

p.66 EXCEPTION HANDLING IN KYLIX

[author : Eli Boling and Chuck Jazdzewski]

Kylix brings Borland's Delphi toolset and environment from Windows to Linux. And one of the most challenging aspects of the port involved exception handling.

p.73 PACKETCABLE SECURITY

[author : Linden deCarmo]

The PacketCable Security Specification provides rigorous security standards for cable-based telephony networks.

EMBEDDED SYSTEMS

p.83 XML FOR INSTRUMENT CONTROL AND MONITORING

[author : David Cox]

The Instrument Markup Language is an XML dialect designed to aid in the exchange of data and commands with remote instruments.

INTERNET PROGRAMMING

p.87 E-MAIL RELAYING

[author : Robert Kiesling]

The rapidly increasing number of e-mail relay packages means interoperability challenges for programmers who need compatibility with existing e-mail software.

PROGRAMMER'S TOOLCHEST

p.93 BIOMETRIC SECURITY

[author : Richard Dale]

Biometrics offers a strong authentication alternative to traditional passwords and tokens, and can do so without imposing the burden and cost of application source-code modification.

COLUMNS

p.99 PROGRAMMING PARADIGMS

[author : Michael Swaine]

Just because Michael sees conspiracies everywhere, doesn't mean he's fantasizing. Or does it?

p.103 C PROGRAMMING

[author : Al Stevens]

If he didn't know before, you can bet Al knows now that Schroeder is the piano player and Linus is the blanket-holder. Al goes on to examine programming issues related to a specific DSP audio problem.

p.107 EMBEDDED SPACE

[author : Ed Nisley]

It's no surprise that microcontrollers and other embedded devices are used in life-support systems. But can you really, really trust them?

p.111 JAVA Q&A

[author : Oliver Goldman]

Java provides two types of exceptions: checked and unchecked.

p.117 ALGORITHM ALLEY

[author : Jiri Kripac]

The algorithm Jiri presents here performs undo/redo for a general network of interconnected objects.

p.125 DR. ECCO'S OMNIHEURIST CORNER

[author : Dennis E. Shasha]

Ecco and Liane discover that urban planning in Texas isn't an oxymoron after all.

p.128 PROGRAMMER'S BOOKSHELF

[author : Jack J. Woehr]

Jack examines a pair of books that focus on embedded systems: Embedded Controller Hardware Design, by Ken Arnold; and Programming Microcontrollers in C, Second Edition, by

FORUM

p.10 LETTERS

[author : you]

p.18 NEWS & VIEWS

[author : Shannon Cochran]

p.134 OF INTEREST

[author : Della Song]

p.136 SWAINE'S FLAMES

[author : Michael Swaine]