<--- Back to Details
First PageDocument Content
United States government secrecy / Data security / Sensitive Security Information / Sensitive but unclassified / Freedom of Information Act / Classified information / Information sensitivity / Security awareness / Vulnerability / Security / National security / Computer security
Date: 2014-05-06 23:09:11
United States government secrecy
Data security
Sensitive Security Information
Sensitive but unclassified
Freedom of Information Act
Classified information
Information sensitivity
Security awareness
Vulnerability
Security
National security
Computer security

Control and Protection of "Sensitive Security Information"

Add to Reading List

Source URL: fas.org

Download Document from Source Website

File Size: 97,18 KB

Share Document on Facebook

Similar Documents

Cryptography / Secret sharing / Public-key cryptography / Secure multi-party computation / Commitment scheme / Cryptographic protocol / Block cipher / Zero-knowledge proof

Rene Peralta and John Kelsey, National Institute of Standards and Technology, Computer Security Division. Nigel Smart, Professor of Cryptology,

DocID: 1xV9y - View Document

Cryptography / Public-key cryptography / Post-quantum cryptography / Smart cards / Hash-based cryptography / Digital signature / Cryptographic hash function / Java Card / Hash function / Security token / Cryptographic primitive / XMSS

Is Java Card ready for hash-based signatures? Ebo van der Laan1 , Erik Poll2 , Joost Rijneveld2 , Joeri de Ruiter2 , Peter Schwabe2 , and Jan Verschuren1 ? 1 Netherlands National Communication Security Agency (NLNCSA)

DocID: 1xV0o - View Document

Cryptography / Post-quantum cryptography / Quantum cryptography / Emerging technologies / Quantum computing / Key / Supersingular isogeny key exchange / Ring learning with errors key exchange

Is Java Card ready for hash-based signatures? Ebo van der Laan1 , Erik Poll2 , Joost Rijneveld2 , Joeri de Ruiter2 , Peter Schwabe2 and Jan Verschuren1 1 Netherlands National Communication Security Agency (NLNCSA)

DocID: 1xUSb - View Document

Theoretical computer science / Quantum information science / Emerging technologies / Physics / Quantum cryptography / Quantum mechanics / Quantum computing / Quantum technology / Quantum information / Quantum network / Pittsburgh Quantum Institute

National Quantum Initiative Act The National Quantum Initiative Act establishes a federal program to accelerate quantum research and development for the United States’ economic and national security. Quantum Informatio

DocID: 1xTWc - View Document

Cryptography / Cryptographic software / Technical communication / E-commerce / Microsoft CryptoAPI / Public-key cryptography / Key / Usability / RSA / Application programming interface / Symmetric-key algorithm / OpenSSL

Comparing the Usability of Cryptographic APIs Yasemin Acar, Michael Backes, Sascha Fahl, Simson Garfinkel∗ , Doowon Kim† , Michelle L. Mazurek† , and Christian Stransky CISPA, Saarland University; ∗ National Inst

DocID: 1xT8l - View Document