Skip to main content
Perhaps you meant Charon explained?

Search results for "decharon explained"

Filters: Cybersecurity 31 ×
Viewing 1 - 17 of 17 results by relevance
Proceedings

Beyond Spectre: Confronting New Technical and Policy Challenges: Proceedings of a Workshop  (2019)

Proceedings

Recoverability as a First-Class Security Objective: Proceedings of a Workshop  (2018)

Proceedings

Software Update as a Mechanism for Resilience and Security: Proceedings of a Workshop  (2017)

Consensus Study Report

Software for Dependable Systems: Sufficient Evidence?  (2007)

Proceedings

Implications of Artificial Intelligence for Cybersecurity: Proceedings of a Workshop  (2019)

Consensus Study Report

Decrypting the Encryption Debate: A Framework for Decision Makers  (2018)

Consensus Study Report

Who Goes There?: Authentication Through the Lens of Privacy  (2003)

Consensus Study Report

Toward a Safer and More Secure Cyberspace  (2007)

Consensus Study Report

At the Nexus of Cybersecurity and Public Policy: Some Basic Concepts and Issues  (2014)

Guidebook on Best Practices for Airport Cybersecurity  (2015)

Consensus Study Report

Critical Code: Software Producibility for Defense  (2010)

Consensus Study Report

Improving State Voter Registration Databases: Final Report  (2010)

Consensus Study Report

Biometric Recognition: Challenges and Opportunities  (2010)

Consensus Study Report

Looking Ahead at the Cybersecurity Workforce at the Federal Aviation Administration  (2021)

Proceedings

Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy  (2010)

Consensus Study Report

Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities  (2009)

Proceedings

Cryptographic Agility and Interoperability: Proceedings of a Workshop  (2017)