Ramifications of DARPA's Programming Computation on Encrypted Data Program (original) (raw)

Defining the Roles, Responsibilities, and Functions for Data Science Within the Defense Intelligence Agency

Rebeca Orrie

2016

View PDFchevron_right

The Economic Impacts of the Advanced Encryption Standard, 1996–2017

david leech

Annals of Science and Technology Policy

View PDFchevron_right

Clouded data: Privacy and the promise of encryption

Tsvetelina Hristova

Big Data & Society, 2019

View PDFchevron_right

For More Information Support RAND SAFETY AND JUSTICE PROGRAM and the GLOBAL RISK AND SECURITY CENTER

Amanzy Amanzy

View PDFchevron_right

Does Data Security Matter? The Case for Cryptography

Dr. Qais Faryadi

2013

View PDFchevron_right

Cybersecurity and States: Same Bed, Different Nightmares

AJM Shafiul Alam Bhuiyan

Internet Governance and the Global South, 2014

View PDFchevron_right

The Economic Impact of Laws that Weaken Encryption

William Lehr

SSRN Electronic Journal, 2021

View PDFchevron_right

Review of the European Data Protection Directive

Maarten Botterman

View PDFchevron_right

CryptoCredit

Leo Castro

Proceedings of the First ACM International Conference on AI in Finance, 2020

View PDFchevron_right

RAND corporation'dan rantsız bir kitabın pdf formatlısı

Evren İşbilen

View PDFchevron_right

Baur-Ahrens A, Krüger M, Ammicht Quinn R, Leese M and Matzner T (2015) How Smart is "Smart Security"? Exploring Data Subjectivity and Resistance. Final Report. Tübingen: IZEW.

Andreas Baur, Marco Krüger

View PDFchevron_right

Data Confidentiality: The Next Five Years Summary and Guide to Papers

Joe Gonzalez

Journal of Privacy and Confidentiality, 2010

View PDFchevron_right

Analysis Of Cryptographic Technique And Its Applications In Modern Human Life - IRE Journals

Jannatul Naime

2019

View PDFchevron_right

Overview of Cryptography Cybersecurity, Data Privacy & eDiscovery Law & Policy

Anthony-Claret Onwutalobi

Social Science Research Network, 2011

View PDFchevron_right

Data Protection

Maarten Botterman

2009

View PDFchevron_right

Security principles for public-resource modeling research

Andrew Simpson

13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2004

View PDFchevron_right

Cryptology and Information Security - Past, Present, and Future Role in Society

Soumitra Bhattacharya

2019

View PDFchevron_right

The Maintenance of Data Security and the Trustworthiness of Individuals

David C . Berliner

1977

View PDFchevron_right

Homeland Security National Risk Characterization

Daniel Gerstein

2018

View PDFchevron_right

Disclosure risk vs. data utility: The RU confidentiality map

George Duncan

Chance, 2001

View PDFchevron_right

Computing Statistics from Private Data

George Alter

Data Science Journal

View PDFchevron_right

The RAND Corporation is a nonprofit research organization providing objective analysis and effective solutions that address the challenges facing the public and private sectors around the world

erik frinking

2005

View PDFchevron_right

Security in Computer and Information Sciences

Erol Gelenbe

Communications in Computer and Information Science, 2018

View PDFchevron_right

Journal of Computer Science and Information Security July 2011

Kashyap Shah, Mahendra Kumar, Journal of Computer Science IJCSIS

View PDFchevron_right

NIST Special Publication 800-57 Part 1 Revision 4 Recommendation for Key Management Part 1: General

Tom Smith

View PDFchevron_right

Journal of Computer Science and Information Security June 2011

Kifayat Ullah Khan, Mst Selvi, Abd Jemai, Dewi Agushinta R., Amjad Ali, Adekunle Yinka, Journal of Computer Science IJCSIS

View PDFchevron_right

Encryption Technology and Privacy Protection: A Critique

Jacob Enyia

International Journal of Engineering Science and Computing, 2018

View PDFchevron_right

Barriers to science in security

Mark Matties

Proceedings of the 26th Annual Computer Security Applications Conference on - ACSAC '10, 2010

View PDFchevron_right

Privacy Decision Making: The Brain Approach

Fariborz Farahmand

Computer, 2019

View PDFchevron_right

Encrypting the global information infrastructure

Dorothy E Denning

Computer Fraud & Security, 1996

View PDFchevron_right

Students and Taxes: a Privacy-Preserving Social Study Using Secure Computation

Baldur Kubo

2015

View PDFchevron_right

Supporting security-oriented, inter-disciplinary research: crossing the social, clinical and geospatial domains

john watt

2008

View PDFchevron_right