Skip to main content

Search results for segmented perpetrators

Filters: Computers and Information Technology Computers and Information Technology ×
Viewing 1 - 20 of 54 results by relevance
Proceedings

Exploring Encryption and Potential Mechanisms for Authorized Government Access to Plaintext: Proceedings of a Workshop  (2016)

Consensus Study Report

Critical Information Infrastructure Protection and the Law: An Overview of Key Issues  (2003)

Consensus Study Report

IDs -- Not That Easy: Questions About Nationwide Identity Systems  (2002)

Consensus Study Report

At the Nexus of Cybersecurity and Public Policy: Some Basic Concepts and Issues  (2014)

Proceedings

Cryptographic Agility and Interoperability: Proceedings of a Workshop  (2017)

Consensus Study Report

Review of Three Divisions of the Information Technology Laboratory at the National Institute of Standards and Technology: Fiscal Year 2015  (2015)

Cryptography's Role in Securing the Information Society  (1996)

Consensus Study Report

A Review of the Next Generation Air Transportation System: Implications and Importance of System Architecture  (2015)

Fostering Research on the Economic and Social Impacts of Information Technology  (1998)

Computing and Communications in the Extreme: Research for Crisis Management and Other Applications  (1996)

Consensus Study Report

Broadband: Bringing Home the Bits  (2002)

The Unpredictable Certainty: White Papers  (1997)

Consensus Study Report

Making IT Better: Expanding Information Technology Research to Meet Society's Needs  (2000)

Consensus Study Report

Letter Report for the Committee on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy  (2010)

Proceedings

Summary of a Workshop on Information Technology Research for Crisis Management  (1999)

Growing Vulnerability of the Public Switched Networks: Implications for National Security Emergency Preparedness  (1989)

Consensus Study Report

Who Goes There?: Authentication Through the Lens of Privacy  (2003)

Consensus Study Report

Computers at Risk: Safe Computing in the Information Age  (1991)