A Relational Model of Data for Large Shared Data Banks
Comparing Performance of Solid State Devices and Mechanical Disks
User’s Guide to Securing External Devices for Telework and Remote Access
Guide to Enterprise Telework and Remote Access Security (Draft)
Unraveling A Well Woven Solo
Attacking and defending the McEliece cryptosystem
Television's Performance on Election Night 2000
The MD6 Hash Function
The Skein Hash Function Family
Designing and implementing malicious hardware
Experiences Threat Modeling at Microsoft
Cross-Cultural Analysis of Students with Exceptional Talent in Mathematical Problem Solving
Cross-Site Request Forgeries
On the potential for extinction by Muller's Ratchet in Caenorhabditis elegans
The ABC-conjecture
Digital Computational Imaging
see moreThat's it!