Descriptor
Algorithms | 2 |
Codification | 2 |
Computer Programs | 2 |
Computers | 1 |
Conference Reports | 1 |
Confidentiality | 1 |
Data Processing | 1 |
Databases | 1 |
Equipment | 1 |
Flow Charts | 1 |
Information Networks | 1 |
More ▼ |
Source
Publication Type
Collected Works - Proceedings | 1 |
Reports - Research | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating

Rothstein, Jerome – 1977
Addressing the problem of protecting confidential information and data stored in computer databases from access by unauthorized parties, this paper details coding schemes which present such astronomical work factors to potential code breakers that security breaches are hopeless in any practical sense. Two procedures which can be used to encode for…
Descriptors: Algorithms, Codification, Computer Programs, Confidentiality
Branstad, Dennis K., Ed. – 1978
The 15 papers and summaries of presentations in this collection provide technical information and guidance offered by representatives from federal agencies and private industry. Topics discussed include physical security, risk assessment, software security, computer network security, and applications and implementation of the Data Encryption…
Descriptors: Algorithms, Codification, Computer Programs, Computers