NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 2 results Save | Export
PDF pending restoration PDF pending restoration
Rothstein, Jerome – 1977
Addressing the problem of protecting confidential information and data stored in computer databases from access by unauthorized parties, this paper details coding schemes which present such astronomical work factors to potential code breakers that security breaches are hopeless in any practical sense. Two procedures which can be used to encode for…
Descriptors: Algorithms, Codification, Computer Programs, Confidentiality
Branstad, Dennis K., Ed. – 1978
The 15 papers and summaries of presentations in this collection provide technical information and guidance offered by representatives from federal agencies and private industry. Topics discussed include physical security, risk assessment, software security, computer network security, and applications and implementation of the Data Encryption…
Descriptors: Algorithms, Codification, Computer Programs, Computers