Institution
National Security Agency
Government•Fort George Meade, Maryland, United States•
About: National Security Agency is a government organization based out in Fort George Meade, Maryland, United States. It is known for research contribution in the topics: Signal & Encryption. The organization has 393 authors who have published 485 publications receiving 15916 citations. The organization is also known as: NSA & N.S.A..
Topics: Signal, Encryption, Finite field, Error detection and correction, Security information and event management
Papers published on a yearly basis
Papers
More filters
•
15 Dec 2020TL;DR: A secure charging device as discussed by the authors provides a charge signal from a host device to an end-user device to charge a battery of the end user device by using data transmission logic and data monitoring logic.
Abstract: A secure charging device provides a charge signal from a host device to an end-user device to charge a battery of the end-user device. The secure charging device includes data transmission logic for transmitting data signals from the host device to the end-user device. The secure charging device also include data monitoring logic for monitoring the data transferred from the host device to the end-user device. Alternatively, the data monitoring logic may include logic for terminating the data transmission signal.
••
TL;DR: In this paper, a practical example of how the Senior Technical Development Program (STDP) was applied for the development of the author as she respecialized as a counterintelligence psychologist is discussed.
Abstract: This article is based on material from the Presidential Address at the 2009 Society of Psychologists in Management Conference. It builds on an article (Civiello & Welker, 2009) that describes the National Security Agency (NSA) leadership model and the NSA Senior Technical Development Program (STDP). This article provides a practical example of how the STDP was applied for the development of the author as she respecialized as a counterintelligence psychologist. Her role as an embedded consultant is also discussed.
•
19 Mar 2014TL;DR: In this paper, a multilevel chain of trust/revision by certifying each user, device, action, and circumstance in the creation, modification, and transmission of computer information, including a revision history of any modification, is presented.
Abstract: A device and method of controlled, multilevel chain of trust/revision by certifying of each user, device, action, and circumstance in the creation, modification, and transmission of computer information, including a revision history of any modification, and identification of any uncertified computer object used.
••
02 Nov 1997TL;DR: A simulation experiment is designed and conducted, demonstrating the feasibility of detecting such a proposed bearer option request under many environmental conditions.
Abstract: The U.S. government is participating in TDMA and CDMA cellular/PCS standard bodies to develop bearer service option modes that will enable secure end-to-end digital voice between cellular handsets and existing STLT-m (Secure Terminal Unit, 3rd generation, or "STU3") phones. A requirement is that handsets be able to reliably detect brief analog "go-secure" signaling sent by a STU3 as it attempts to transition from plain voice to encrypted voice mode, particularly under conditions of fading errors. A simulation experiment is designed and conducted, demonstrating the feasibility of detecting such a proposed bearer option request under many environmental conditions.
•
21 May 2009TL;DR: In this article, a collision-free hashing of near-match inputs is presented, which includes the following components: an adder for receiving an input i, a check value cv, and outputs n which is greater than or equal to the sum of i and cv.
Abstract: A device and method of collision-free hashing of near-match inputs that includes the following components. An adder for receiving an input i, a check value cv, and outputs n, which is greater than or equal to the sum of i and cv. A checker for receiving a value n, a value d, a first polynomial, and an output at which the first polynomial appears if the checker determines that the first polynomial is of degree proportional to d and divides x n +1. A factorization block for factoring the first polynomial into a second polynomial and a third polynomial. A first division block for dividing an input of bit length i by the second polynomial to generate a first portion of the hash of the input. A second division block for dividing the input by the third polynomial to generate a second portion of the hash of the input.
Authors
Showing all 394 results
Name | H-index | Papers | Citations |
---|---|---|---|
Robert L. Grossman | 52 | 320 | 15551 |
Dianne P. O'Leary | 44 | 223 | 11469 |
Keith Schwab | 37 | 91 | 7617 |
Chris A. Mack | 31 | 231 | 4592 |
Young H. Kwark | 28 | 123 | 3133 |
Christopher J. K. Richardson | 23 | 122 | 1535 |
Akin Akturk | 19 | 102 | 1272 |
Julius Goldhar | 19 | 92 | 1218 |
Kevin Osborn | 19 | 65 | 2153 |
Patrick W. Dowd | 18 | 61 | 1437 |
Kevin Borders | 17 | 26 | 1314 |
David G. Harris | 17 | 102 | 1055 |
R. W. R. Darling | 16 | 54 | 1762 |
Gail Letzter | 15 | 32 | 986 |
Benjamin Palmer | 15 | 37 | 659 |