Capstone (cryptography)

Known as: CAPSTONE chip, Capstone 
Capstone is the name of a United States government long-term project to develop cryptography standards for public and government use. Capstone was… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2013
Highly Cited
2013
The importance of using requirements information in the testing phase has been well recognized by the requirements engineering… (More)
  • table I
  • figure 1
  • figure 2
  • table II
  • table III
Is this relevant?
Highly Cited
2012
Highly Cited
2012
In this paper, five major shifts in engineering education are identified. During the engineering science revolution, curricula… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2008
Highly Cited
2008
In most cases authors are permitted to post their version of the article (e.g. in Word or Tex form) to their personal website or… (More)
  • figure 1
  • table 1
  • table 1
  • table 1
Is this relevant?
Highly Cited
2007
Highly Cited
2007
This paper presents Game2Learn, an innovative project designed to leverage games in retaining students in computer science (CS… (More)
  • table 1
  • figure 2
  • figure 1
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Despite the growing prominence of canonical action research (CAR) in the information systems discipline, a paucity of… (More)
  • figure 1
  • table 3
  • table 4
  • table 5
Is this relevant?
Highly Cited
2002
Highly Cited
2002
The Center for Empirically Based Software Engineering helps improve software development by providing guidelines for selecting… (More)
Is this relevant?
Highly Cited
2000
Highly Cited
2000
This article presents the MSIS 2006 Model Curriculum and Guidelines for Graduate Degree Programs in Information Systems. As with… (More)
  • figure 1
  • table 1
  • figure 2
  • table 2
  • table 3
Is this relevant?
Highly Cited
1998
Highly Cited
1998
Editor’s Note: John Elkington’s new book, Cannibals with Forks: The Triple Bottom Line of 21stCentury Business, has been hailed… (More)
Is this relevant?
Highly Cited
1996
Highly Cited
1996
The use of cryptographic devices as \black boxes", namely trusting their internal designs, has been suggested and in fact… (More)
Is this relevant?