DIMACS

Results: 258



#Item
221Internet standards / Secure communication / Transport Layer Security / Symmetric-key algorithm / Public-key cryptography / Block cipher / Advanced Encryption Standard / Cryptographic hash function / Cipher / Cryptography / Cryptographic protocols / Internet protocols

Report on DIMACS∗ Tutorial on Applied Cryptography and Network Security Date of tutorial: August 4 – 7, 2003 Tutorial Organizer: Rebecca Wright, Stevens Institute of Technology Primary Lecturer:

Add to Reading List

Source URL: dimacs.rutgers.edu

Language: English - Date: 2004-02-19 13:05:52
222Public safety / Combinatorics / DIMACS / Cigital / Gary McGraw / Edward Felten / Security engineering / Cryptography / Computer security / Security / Crime prevention / National security

DIMACS Center Rutgers University Software Security Workshop Final Report

Add to Reading List

Source URL: dimacs.rutgers.edu

Language: English - Date: 2005-11-30 12:44:30
223Computational neuroscience / Neural networks / Cybernetics / Data analysis / Neurophysiology / Artificial neural network / Epilepsy / Electroencephalography / Functional magnetic resonance imaging / Science / Neuroscience / Biology

DIMACS* Workshop on Data Mining, Systems Analysis and Optimization in Neuroscience Organizers: W. Art Chaovalitwongse, Rutgers University Leonidas D. Iasemidis, Arizona State University

Add to Reading List

Source URL: dimacs.rutgers.edu

Language: English - Date: 2006-09-14 14:14:38
224Cryptographic protocols / Communication / Communication complexity / Computational complexity theory / Quantum complexity theory / Quantum information science / Communications protocol / IP / Secure multi-party computation / Theoretical computer science / Applied mathematics / Information

DIMACS Technical Report[removed]Version of 2010–01–19 Approximate Privacy: PARs for Set Problems by Joan Feigenbaum1,2

Add to Reading List

Source URL: www.cs.yale.edu

Language: English - Date: 2010-01-20 15:00:17
225Computer network security / Hacking / Software testing / Vulnerability / Full disclosure / Computer security / Cyberwarfare / Security

DOC Document

Add to Reading List

Source URL: dimacs.rutgers.edu

Language: English - Date: 2007-01-11 10:41:39
226Election fraud / Electronic voting / Electoral systems / Election technology / Voter-verified paper audit trail / Ballot / Absentee ballot / Voting machine / Optical scan voting system / Politics / Elections / Government

Report on DIMACS∗ Workshop on Electronic Voting – Theory and Practice Presented under the auspices of the Special Focus on Communication Security and Information Privacy and the Special Focus on Computation and the S

Add to Reading List

Source URL: dimacs.rutgers.edu

Language: English - Date: 2004-12-13 15:08:29
227Systems theory / Structure / Knowledge / Electrical engineering / Electronic engineering / Topology / Social network / Peer-to-peer / Network topology / Science / Networks / Network theory

Network Economics and Security Engineering

Add to Reading List

Source URL: dimacs.rutgers.edu

Language: English - Date: 2007-01-22 10:41:10
228Routing / Networking hardware / Router / Server appliance / Multihoming / Border Gateway Protocol / Forwarding plane / Network architecture / Internet / Computing

Routing Security Economics Steven M. Bellovin http://www.cs.columbia.edu/~smb Columbia University January 18, 2007

Add to Reading List

Source URL: dimacs.rutgers.edu

Language: English - Date: 2007-01-22 10:31:33
229Actuarial science / Crime prevention / National security / Bell–LaPadula model / Risk / Information security / Access control / Fuzzy logic / Type enforcement / Security / Computer security / Public safety

Fuzzy MLS: An Experiment on Quantified Risk–Adaptive Access Control Pau–Chen Cheng [removed] Pankaj Rohatgi

Add to Reading List

Source URL: dimacs.rutgers.edu

Language: English - Date: 2007-01-17 08:58:09
230Computer network security / Data security / National security / Vulnerability / Information security / IT risk / Security through obscurity / Internet privacy / Threat / Security / Computer security / Cyberwarfare

Workshop on Information Security Economics∗ Date of workshop: January 18–19, 2007 Workshop Organizers: Jean Camp, Indiana University [removed] Alessandro Acquisti, Carnegie Mellon University

Add to Reading List

Source URL: dimacs.rutgers.edu

Language: English - Date: 2008-02-29 09:44:53
UPDATE