Center for Research and National Security

Results: 161



#Item
21

Climate Change and National Security: Implications and Preparedness Galen A. McKinley Atmospheric and Oceanic Sciences and Center for Climatic Research University of Wisconsin – Madison Climate change has a variety of

Add to Reading List

Source URL: ccr.meteor.wisc.edu

- Date: 2014-04-02 14:51:12
    22Law / Internet privacy / Electronic Privacy Information Center / Information privacy / FTC Fair Information Practice / Identity theft / Data breach / Personally identifiable information / Consumer privacy / Privacy / Ethics / Security

    COMMENTS OF THE ELECTRONIC PRIVACY INFORMATION CENTER to THE NATIONAL COORDNIATION OFFICE (NCO) FOR NETWORKING AND INFORMATION TECHNOLOGY RESEARCH AND DEVELOPMENT (NITRD) Request for Information: National Privacy Researc

    Add to Reading List

    Source URL: epic.org

    Language: English - Date: 2014-10-22 10:05:49
    23Cyberwarfare / Electronic warfare / Hacking / Military technology / Steven M. Bellovin / National Security Agency / Security / National security / Computer security

    The German Center for Research and Innovation and German U15 cordially invite you to a panel discussion on: Cyber Security and Ethics Thursday, May 21, 2015, from 6:30 – 8:30 p.m. with

    Add to Reading List

    Source URL: www.german-u15.de

    Language: English - Date: 2015-05-05 03:34:40
    24Mathematics / Error detection and correction / Finite fields / Applied mathematics / Computing / McEliece cryptosystem / Forward error correction / RSA / Low-density parity-check code / Public-key cryptography / Coding theory / Electronic commerce

    Flexible Quasi-Dyadic Code-Based Public-Key Encryption and Signature Kazukuni Kobara Research Center for Information Security (RCIS), National Institute of Advanced Industrial Science and Technology (AIST), 10F 1003, Aki

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2010-05-20 21:26:35
    25National Defense University / Japan Self-Defense Forces / Japan–United States relations / International security / Richard Kugler / Joseph McMillan / International relations / Security studies / Middle States Association of Colleges and Schools

    Strategic Perspectives 18 The U.S.-Japan Alliance: Review of the Guidelines for Defense Cooperation by James J. Przystup Center for Strategic Research

    Add to Reading List

    Source URL: inss.ndu.edu

    Language: English - Date: 2015-03-05 11:01:05
    26Cyberwarfare / Transmission Control Protocol / Firewall / Pcap / Packet capture / Tcpdump / Traffic flow / Denial-of-service attack / National Energy Research Scientific Computing Center / Software / Computer network security / Computing

    Building a Time Machine for Efficient Recording and Retrieval of High-Volume Network Traffic Stefan Kornexl Vern Paxson Holger Dreger TU M¨unchen ICSI / LBNL TU M¨unchen Abstract There are times when it would be extrao

    Add to Reading List

    Source URL: www.icir.org

    Language: English - Date: 2005-08-11 15:51:44
    27Technology / Election monitoring / Carter Center / Electoral fraud / Democracy / E-democracy / Organization for Security and Co-operation in Europe / American democracy promotion in the Middle East and North Africa / National Endowment for Democracy / Politics / Elections / Government

    Microsoft Word - Why Believe International Election Monitors v2 Dec

    Add to Reading List

    Source URL: hyde.research.yale.edu

    Language: English - Date: 2010-06-25 16:23:32
    28Government / John Horgan / John Mueller / Definitions of terrorism / Cato Institute / Counter-terrorism / United States Department of Homeland Security / War on Terror / Max Taylor / Terrorism / National security / Public safety

    February 8, 2015 VITA AND BIBLIOGRAPHY OF JOHN MUELLER Woody Hayes Senior Research Scientist (and Woody Hayes Chair of National Security Studies Emeritus), Mershon Center for International Security Studies and Adjunct Pr

    Add to Reading List

    Source URL: www.politicalscience.osu.edu

    Language: English - Date: 2015-02-10 10:19:03
    29Cyberwarfare / Computer networking / Pcap / Firewall / Transmission Control Protocol / Traffic flow / Internet protocol suite / Packet Processing / Port / Computing / Software / Computer network security

    Bro: A System for Detecting Network Intruders in Real-Time Vern Paxson Lawrence Berkeley National Laboratory, Berkeley, CA and AT&T Center for Internet Research at ICSI, Berkeley, CA

    Add to Reading List

    Source URL: www.icir.org

    Language: English - Date: 2008-01-24 05:22:35
    30Estimation theory / Fixed effects model / Regression analysis / Coding theory / Communication / Error detection and correction

    Short collusion-secure fingerprint codes against three pirates Koji Nuida Research Center for Information Security (RCIS), National Institute of Advanced Industrial Science and Technology (AIST), Sotokanda, Chiyo

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2010-12-15 09:16:20
    UPDATE