scispace - formally typeset
Search or ask a question
Institution

National Security Agency

GovernmentFort George Meade, Maryland, United States
About: National Security Agency is a government organization based out in Fort George Meade, Maryland, United States. It is known for research contribution in the topics: Signal & Encryption. The organization has 393 authors who have published 485 publications receiving 15916 citations. The organization is also known as: NSA & N.S.A..


Papers
More filters
Patent
15 Dec 2020
TL;DR: A secure charging device as discussed by the authors provides a charge signal from a host device to an end-user device to charge a battery of the end user device by using data transmission logic and data monitoring logic.
Abstract: A secure charging device provides a charge signal from a host device to an end-user device to charge a battery of the end-user device. The secure charging device includes data transmission logic for transmitting data signals from the host device to the end-user device. The secure charging device also include data monitoring logic for monitoring the data transferred from the host device to the end-user device. Alternatively, the data monitoring logic may include logic for terminating the data transmission signal.
Journal ArticleDOI
TL;DR: In this paper, a practical example of how the Senior Technical Development Program (STDP) was applied for the development of the author as she respecialized as a counterintelligence psychologist is discussed.
Abstract: This article is based on material from the Presidential Address at the 2009 Society of Psychologists in Management Conference. It builds on an article (Civiello & Welker, 2009) that describes the National Security Agency (NSA) leadership model and the NSA Senior Technical Development Program (STDP). This article provides a practical example of how the STDP was applied for the development of the author as she respecialized as a counterintelligence psychologist. Her role as an embedded consultant is also discussed.
Patent
19 Mar 2014
TL;DR: In this paper, a multilevel chain of trust/revision by certifying each user, device, action, and circumstance in the creation, modification, and transmission of computer information, including a revision history of any modification, is presented.
Abstract: A device and method of controlled, multilevel chain of trust/revision by certifying of each user, device, action, and circumstance in the creation, modification, and transmission of computer information, including a revision history of any modification, and identification of any uncertified computer object used.
Proceedings ArticleDOI
02 Nov 1997
TL;DR: A simulation experiment is designed and conducted, demonstrating the feasibility of detecting such a proposed bearer option request under many environmental conditions.
Abstract: The U.S. government is participating in TDMA and CDMA cellular/PCS standard bodies to develop bearer service option modes that will enable secure end-to-end digital voice between cellular handsets and existing STLT-m (Secure Terminal Unit, 3rd generation, or "STU3") phones. A requirement is that handsets be able to reliably detect brief analog "go-secure" signaling sent by a STU3 as it attempts to transition from plain voice to encrypted voice mode, particularly under conditions of fading errors. A simulation experiment is designed and conducted, demonstrating the feasibility of detecting such a proposed bearer option request under many environmental conditions.
Patent
21 May 2009
TL;DR: In this article, a collision-free hashing of near-match inputs is presented, which includes the following components: an adder for receiving an input i, a check value cv, and outputs n which is greater than or equal to the sum of i and cv.
Abstract: A device and method of collision-free hashing of near-match inputs that includes the following components. An adder for receiving an input i, a check value cv, and outputs n, which is greater than or equal to the sum of i and cv. A checker for receiving a value n, a value d, a first polynomial, and an output at which the first polynomial appears if the checker determines that the first polynomial is of degree proportional to d and divides x n +1. A factorization block for factoring the first polynomial into a second polynomial and a third polynomial. A first division block for dividing an input of bit length i by the second polynomial to generate a first portion of the hash of the input. A second division block for dividing the input by the third polynomial to generate a second portion of the hash of the input.

Authors

Showing all 394 results

NameH-indexPapersCitations
Robert L. Grossman5232015551
Dianne P. O'Leary4422311469
Keith Schwab37917617
Chris A. Mack312314592
Young H. Kwark281233133
Christopher J. K. Richardson231221535
Akin Akturk191021272
Julius Goldhar19921218
Kevin Osborn19652153
Patrick W. Dowd18611437
Kevin Borders17261314
David G. Harris171021055
R. W. R. Darling16541762
Gail Letzter1532986
Benjamin Palmer1537659
Network Information
Related Institutions (5)
IBM
253.9K papers, 7.4M citations

75% related

Microsoft
86.9K papers, 4.1M citations

75% related

AT&T
21.2K papers, 949K citations

74% related

Google
39.8K papers, 2.1M citations

72% related

University of Trento
30.9K papers, 896.6K citations

72% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
20222
20218
202014
201914
20184
20178