The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Reports and Papers Archive


Browse All Papers »       Submit A Paper »

Report od the NIST Workshop on Key Escrow Encryption

Arthur E. Oldehoeft
Added 2002-07-26

Windows NT Chapter

A. Silberschatz,P. Galvin
Added 2002-07-26

Security Flaws in the Hot Java Web Browser

D. Dean,D.S. Wallach
Added 2002-07-26

Bias Plus Variance Decomposition for Zero-One Loss Functions

R. Kohavi,D.H. Wolpert
Added 2002-07-26

A linear Method for Deviation Detection in Large Databases

A. Arning,R. Agrawal,P. Raghavan
Added 2002-07-26

RALPH: Rapidly Adapting Lateral Position Handler

D. Pomerleau
Added 2002-07-26

Noise-Tolerant Instance-Based Learning Algorithms

D.W. Aha,D. Kibler
Added 2002-07-26

Public-Key Cryptography

James Nechvatal
Added 2002-07-26

Maintenance Testing for the Data Encryption Standard

Jason Gait

This publication describes the design of four maintenance tests for the Federal Information Processing Data Encryption Standard (DES).  The tests consist of an iterative procedure that tests the operation of DES devices by using a small program and minimum data.  The tests are designed to be independent of implementation and to be fast enough to test devices during actual operation.  The tests are defined as four specific stopping points in a general testing process and satisfy four testing requirements of increasing degree of completeness depending on the throughness of testing desired.

Added 2002-07-26

Database System Security

David Hsiao,Terry Mayfield
Added 2002-07-26

GrIDS-A Graph Based Intrusion Detection System for Large Networks

S. Standiford, S. Chen,R. Cheung,M. Crawford,F.J. Dilger,J. Hoagland,K. Levitt,C. Wee,R. Yip,D. Zerkle
Added 2002-07-26

Using a High-Performance Programmable Secure Processor

S. W. Smith,E. R. Palmer,S. Weingart
Added 2002-07-26

Computer Vunerability Analysis

I. Krsul,E. Spafford,M. Tripunitara
Added 2002-07-26

A Lattice Model of Secure Information Flow

D. Denning
Added 2002-07-26