Fundraising September 15, 2024 – October 1, 2024 About fundraising
1

Information Warfare And Security

Year:
2000
Language:
english
File:
PDF, 72 KB
english, 2000
2

Stuxnet: What Has Changed?

Year:
2012
Language:
english
File:
PDF, 210 KB
english, 2012
3

The US key escrow encryption technology

Year:
1994
Language:
english
File:
PDF, 395 KB
english, 1994
5

Discussing cyber attack

Year:
2010
Language:
english
File:
PDF, 1.97 MB
english, 2010
6

A lattice model of secure information flow

Year:
1976
Language:
english
File:
PDF, 674 KB
english, 1976
7

Crime and crypto on the information superhighway

Year:
1995
Language:
english
File:
PDF, 1.12 MB
english, 1995
8

Toward more secure software

Year:
2015
Language:
english
File:
PDF, 1.39 MB
english, 2015
10

Encryption and evolving technologies: Tools of organized crime and terrorism

Year:
1998
Language:
english
File:
PDF, 2.33 MB
english, 1998
11

Framework and principles for active cyber defense

Year:
2014
Language:
english
File:
PDF, 219 KB
english, 2014
14

Comments on Responsibility of and Trust in ISPs

Year:
2010
Language:
english
File:
PDF, 60 KB
english, 2010
15

Element-level classification with A1 assurance

Year:
1988
Language:
english
File:
PDF, 780 KB
english, 1988
16

More on master keys for group sharing

Year:
1981
Language:
english
File:
PDF, 228 KB
english, 1981
17

Master keys for group sharing

Year:
1981
Language:
english
File:
PDF, 461 KB
english, 1981
18

Encrypting the global information infrastructure

Year:
1996
Language:
english
File:
PDF, 1.01 MB
english, 1996
19

Location-based authentication: Grounding cyberspace for better security

Year:
1996
Language:
english
File:
PDF, 562 KB
english, 1996
20

Guest Editors' Introduction: Securing the Domain Name System

Year:
2009
Language:
english
File:
PDF, 1.20 MB
english, 2009
21

Cyberwarfare

Year:
2011
Language:
english
File:
PDF, 724 KB
english, 2011
26

Timestamps in key distribution protocols

Year:
1981
Language:
english
File:
PDF, 386 KB
english, 1981
27

HIDING CRIMES IN CYBERSPACE

Year:
1999
Language:
english
File:
PDF, 321 KB
english, 1999
28

Secure statistical databases with random sample queries

Year:
1980
Language:
english
File:
PDF, 1.49 MB
english, 1980
32

Data Security

Year:
1979
Language:
english
File:
PDF, 1.88 MB
english, 1979
33

Certification of programs for secure information flow

Year:
1977
Language:
english
File:
PDF, 891 KB
english, 1977
34

Encryption and Evolving Technologies: Tools of Organized Crime and Terrorism

Year:
1998
Language:
english
File:
PDF, 35 KB
english, 1998
35

Ultra-structure

Year:
1995
Language:
english
File:
PDF, 11.60 MB
english, 1995
36

Secure personal computing in an insecure network

Year:
1979
Language:
english
File:
PDF, 4.15 MB
english, 1979
37

To tap or not to tap

Year:
1993
Language:
english
File:
PDF, 8.90 MB
english, 1993
38

A taxonomy for key escrow encryption systems

Year:
1996
Language:
english
File:
PDF, 5.46 MB
english, 1996
39

Artificial stupidity

Year:
2004
Language:
english
File:
PDF, 548 KB
english, 2004
40

Digital signatures with RSA and other public-key cryptosystems

Year:
1984
Language:
english
File:
PDF, 453 KB
english, 1984
41

Final thoughts

Year:
1993
Language:
english
File:
PDF, 348 KB
english, 1993
43

Embellishments to the note on information flow into arrays

Year:
1980
Language:
english
File:
PDF, 135 KB
english, 1980
46

A fast procedure for finding a tracker in a statistical database

Year:
1980
Language:
english
File:
PDF, 1023 KB
english, 1980