sort by
approximate search
1shortlisttitle datasearch history  
results search [or] ISN:0000000108574939 | 1 hits
Person
ISNI: 
0000 0001 0857 4939
Name: 
Denning, D. E.
Denning, Dorothy
Denning, Dorothy E.
Denning, Dorothy Elizabeth
Denning, Dorothy Elizabeth Robling,
Dorothy E. Denning
Dorothy E. Denning (American information security researcher)
Dorothy E. Denning (Amerikaans informatica)
Dorothy E. Denning (chercheuse en sécurité informatique américaine)
Dorothy E. Denning (especialista en informática)
Dorothy E. Denning (informatica statunitense)
Dorothy E. Denning (Informatikerin)
Robling Denning, Dorothy Elizabet
Robling Denning, Dorothy Elizabeth
Robling, Dorothy Elizabeth Denning
デニング, D. E. R
Dates: 
1945-
Creation class: 
article
cre
Language material
Projected medium
Text
txt
Creation role: 
author
editor
redactor
Related names: 
Bloch, Janina
Denning, Peter J. (1942)
Lin, Herbert
National Research Council (Amerikas Savienotās Valstis). Steering Committee on Rights and Responsibilities of Participants in Networked Communities
National Research Council (U.S.). Steering Committee on Rights and Responsibilities of Participants in Networked Communities
Purdue University
Szafrański, Bolesław
Uezono, Tadahiro (1933-)
Wydawnictwa Naukowo-Techniczne
上園, 忠弘 (1933-)
杉野, 隆 (1946-)
Titles: 
Angō to dēta sekyuriti
Artificial Stupidity
Blogs and military information strategy, 2006:
Certification of programs for secure information flow
Checking classification constraints for consistency and completeness.
Crime and Crypto on the Information Superhighway
Cryptography and data security
Data Security
Digital signatures with RSA and other public-key cryptosystems
Element-Level Classification with A1 Assurance
"Encryption - A sword that cuts two ways"
Encryption and Evolving Technologies: Tools of Organized Crime and Terrorism
fast procedure for finding a tracker in a statistical database, A
Final thoughts
Future of Cryptography, The
Hacktivism and other net crimes
Hiding Crimes in Cyberspace
Information Technology and Security
Information warfare and security
Internet besieged: countering cyberspace scofflaws
intrusion-detection model., An
Kryptografia i ochrona danych
lattice model of secure information flow, A
Master Keys for Group Sharing
More on Master Keys for Group Sharing.
n81100435
Netto jōhō sekyuriti
Protecting public keys and signature keys.
Rights and responsibilities of participants in networked communities
SeaView Security Model, The
Secure information flow in computer systems
Secure personal computing in an insecure network
Secure statistical databases with random sample queries
taxonomy for key escrow encryption systems, A
Terror's Web : how the Internet is transforming Terrorism
Timestamps in key distribution protocols
To tap or not to tap
Ultra-Structure: A design theory for complex systems and processes
United States vs. Craig Neidorf, The
Views for multilevel database security.
Wojna informacyjna i bezpieczeństwo informacji
ネット情報セキュリティ
暗号とデータセキュリティ
Contributed to or performed: 
COMMUNICATIONS- ACM
Notes: 
Vita
Thesis (Ph. D.)--Purdue University, 1975
Sources: 
VIAF DNB LC LNB NDL NLP NUKAT RERO SUDOC WKD
BOWKER
NTA
TEL
ZETO