login
You are not logged in.
search:
AMSER logo
Resources

This paper, provided by Ronald L. Rivest, professor of Electrical Engineering and Computer Science at the Massachusetts Institute of Technology, proposes a new method of computer message security. The method is called...
This Web site serves as a collection of seminal research papers that "every serious student of computer security should read." Mostly from the 1970's but also stretching into the '80s, the papers were first collectively...
The Cryptographic Toolkit is being developed by a subgroup of the National Institute of Standards and Technology (NIST), whos members work to implement and promote cryptographic technologies and efficient practices. The...
The University of Michigan's Center for Information Technology Integration has compiled this introduction to cyber security in order to help people create and manage secure systems. In addition to a clear introduction,...
The Cyber Security Education Consortium (CSEC) is "is a National Science Foundation ATE Regional Center of Excellence dedicated to building an information security workforce who will play a critical role in implementing...
Next 5 Resources >>>

Switch to browsing by Resource Type
Switch to browsing by Format
Switch to browsing by Education Level
Switch to browsing by GEM Subject (Fewer and Broader Classifications)
Switch to browsing by Key Concept


user login
Username:
Password:
why log in?
Manage your resources
Save, organize, and share resources that you find.

Subscribe to bulletins
Automatically be notified about new resources that match your interests.

It's easy, fast, and FREE!
Have a favorite applied math or science site you want others to know about?

SUGGEST a
NEW RESOURCE
to add to AMSER

Copyright 2024 Internet Scout Resource Metadata
Copyright 2024 Internet Scout
NSF NSDL University of Wisconsin Internet Scout
Leave Feedback
http://amser.org/