Search

Your search keyword '"Merkle, Ralph C."' showing total 285 results

Search Constraints

Start Over You searched for: Author "Merkle, Ralph C." Remove constraint Author: "Merkle, Ralph C."
285 results on '"Merkle, Ralph C."'

Search Results

1. Mechanical Computing Systems Using Only Links and Rotary Joints

4. A Certified Digital Signature

5. One Way Hash Functions and DES

8. It's a small, small, small, small world

11. A Digital Signature Based on a Conventional Encryption Function

12. Ab initio thermochemistry of the hydrogenation of hydrocarbon radicals using silicon-, germanium-, Tin-, and lead-substituted methane and isobutene

13. High-level ab initio studies of hydrogen abstraction from prototype hydrocarbon systems

14. Secure Communications Over Insecure Channels.

19. Revival of Alcor Patients Part 1 of 2.

21. Nanotechnology: What will it mean?

22. On the Security of Multiple Encryption.

23. Technical correspondence.

27. Chapter 15: Uploading.

29. A Digital Signature Based on a Conventional Encryption Function.

30. Filtering, Fusion and Dynamic Information Presentation: Towards a General Information Firewall.

31. The Application of PROACT® RCA to Terrorism/Counter Terrorism Related Events.

32. The Qualitative Challenge of Insurgency Informatics.

33. Forecasting Terrorist Groups' Warfare: ‘Conventional' to CBRN.

34. Forecasting Terrorism: Indicators and Proven Analytic Techniques.

35. A Secured Mobile Phone Based on Embedded Fingerprint Recognition Systems.

36. Connections in the World of International Terrorism.

37. Performance Study of a Compiler/Hardware Approach to Embedded Systems Security.

38. Computational Tool in Infrastructure Emergency Total Evacuation Analysis.

39. CODESSEAL: Compiler/FPGA Approach to Secure Applications.

40. Biomonitoring, Phylogenetics and Anomaly Aggregation Systems.

41. Map-Mediated GeoCollaborative Crisis Management.

42. A Jackson Network-Based Model for Quantitative Analysis of Network Security.

43. Learning Classifiers for Misuse Detection Using a Bag of System Calls Representation.

44. The Multi-fractal Nature of Worm and Normal Traffic at Individual Source Level.

45. Intrusion Detection System Using Sequence and Set Preserving Metric.

46. An Ontological Approach to the Document Access Problem of Insider Threat.

47. Active Automation of the DITSCAP.

48. Detecting Deception in Synchronous Computer-Mediated Communication Using Speech Act Profiling.

49. Deception Across Cultures: Bottom-Up and Top-Down Approaches.

50. Data Distortion for Privacy Protection in a Terrorist Analysis System.

Catalog

Books, media, physical & digital resources