02266oam 2200649 450 991070975440332120180828110859.0(CKB)5470000002472702(OCoLC)784231941(OCoLC)778266147(EXLCZ)99547000000247270220120405d1998 ua 0engur|||||||||||txtrdacontentcrdamediacrrdacarrierIssues and recommendations training the digital force /Roy Campbell [and three others]Alexandria, Virginia :U.S. Army Research Institute for the Behavioral and Social Sciences,1998.1 online resource (x, 37 pages) illustrationsStudy report ;98-06"August 1998.""Army Project Number 20465803D730.""Peforming Organization: Human Resources Research Organization"--Report documentation page.Includes bibliographical references.Issues and recommendations SoldiersTraining ofUnited StatesMilitary art and scienceAutomationM1 (Tank)M2 Bradley infantry fighting vehicleM1 (Tank)fastM2 Bradley infantry fighting vehiclefastMilitary art and scienceAutomationfastSoldiersTraining offastUnited StatesfastSoldiersTraining ofMilitary art and scienceAutomation.M1 (Tank)M2 Bradley infantry fighting vehicle.M1 (Tank)M2 Bradley infantry fighting vehicle.Military art and scienceAutomation.SoldiersTraining of.Campbell Roy C.1402143U.S. Army Research Institute for the Behavioral and Social Sciences,Human Resources Research Organization.OCLCEOCLCEOCLCQOCLCFOCLCQOCLCOOCLCQGPOBOOK9910709754403321Issues and recommendations3472066UNINA04922nam 2200601 a 450 991048375920332120200520144314.03-540-34642-210.1007/11766155(CKB)1000000000233002(SSID)ssj0000317418(PQKBManifestationID)11211359(PQKBTitleCode)TC0000317418(PQKBWorkID)10305693(PQKB)10918989(DE-He213)978-3-540-34642-5(MiAaPQ)EBC3068192(PPN)123135451(EXLCZ)99100000000023300220060425d2006 uy 0engurnn|008mamaatxtccrEmerging trends in information and communication security international conference, ETRICS 2006, Freiburg, Germany, June 6-9, 2006 : proceedings /Gunter Muller (ed.)1st ed. 2006.Berlin Springer20061 online resource (XX, 532 p.) Lecture notes in computer science,0302-9743 ;3995LNCS sublibrary. SL 4, Security and cryptologyBibliographic Level Mode of Issuance: Monograph3-540-34640-6 Includes bibliographical references and index.Multilateral Security -- Multilateral Security: Enabling Technologies and Their Evaluation -- Do You Trust Your Recommendations? An Exploration of Security and Privacy Issues in Recommender Systems -- Security in Service-Oriented Computing -- Optimized Workflow Authorization in Service Oriented Architectures -- Dynamic Layer-2 VPN Services for Improving Security in the Grid Environment -- A P2P Content Authentication Protocol Based on Byzantine Agreement -- Secure Mobile Applications -- Transitive Trust in Mobile Scenarios -- An Open, PKI-Based Mobile Payment System -- Secure Rejoining Scheme for Dynamic Sensor Networks -- Developing Provable Secure M-Commerce Applications -- Enterprise Privacy -- An Algebra for Enterprise Privacy Policies Closed Under Composition and Conjunction -- Privacy-Preserving Decision Tree Mining Based on Random Substitutions -- Privacy, Identity, and Anonymity -- Policy-Based Integration of User and Provider-Sided Identity Management -- Privacy with Delegation of Rights by Identity Management -- A Framework for Quantification of Linkability Within a Privacy-Enhancing Identity Management System -- Revocable Anonymity -- Low Latency Anonymous Communication – How Long Are Users Willing to Wait? -- Security Engineering -- Security Engineering Using Problem Frames -- SecTOOL – Supporting Requirements Engineering for Access Control -- Possibilistic Information Flow Control in MAKS and Action Refinement -- Toward a Framework for Forensic Analysis of Scanning Worms -- A Comparison of Market Approaches to Software Vulnerability Disclosure -- Reliable Keystroke Biometric System Based on a Small Number of Keystroke Samples -- Security Policies -- Allowing State Changes in Specifications -- Field Access Analysis for Enforcing Access Control Policies -- Controlling Access to Documents: A Formal Access Control Model -- How to Increase the Security of Digital Rights Management Systems Without Affecting Consumer’s Security -- Security and Protocols -- Secure End-to-End Transport over SCTP -- An Extended Model of Rational Exchange Based on Dynamic Games of Imperfect Information -- Filtering for Private Collaborative Benchmarking -- Intrusion Detection -- On the Use of Word Networks to Mimicry Attack Detection -- Simplifying Signature Engineering by Reuse -- Redesign and Implementation of Evaluation Dataset for Intrusion Detection System -- Requirements of Information Reductions for Cooperating Intrusion Detection Agents -- Perspectives of Cryptographic Security -- Quantum Algorithm for Solving the Discrete Logarithm Problem in the Class Group of an Imaginary Quadratic Field and Security Comparison of Current Cryptosystems at the Beginning of Quantum Computer Age -- Kleptographic Attacks on E-Voting Schemes -- Visual Document Authentication Using Human-Recognizable Watermarks.Lecture notes in computer science ;3995.LNCS sublibrary.SL 4,Security and cryptology.ETRICS 2006Computer securityCongressesComputer networksSecurity measuresCongressesTelecommunication systemsSecurity measuresCongressesComputer securityComputer networksSecurity measuresTelecommunication systemsSecurity measures005.8Muller Gunter1948-434197MiAaPQMiAaPQMiAaPQBOOK9910483759203321Emerging trends in information and communication security4195659UNINA