Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,867,735 papers from all fields of science
Search
Sign In
Create Free Account
Dorothy E. Denning
Known as:
Dorothy Denning
, Dorothy Elizabeth Robling Denning
, Dorothy Elizabeth Denning
Expand
Dorothy Elizabeth Denning (born August 12, 1945) is an American information security researcher who is a graduate of the University of Michigan. She…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
10 relations
Anomaly detection
Clipper chip
Computer science
Computer security
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2010
2010
Corsican Fragments: Difference, Knowledge, and Fieldwork
Matei Candea
2010
Corpus ID: 84840154
Acknowledgments Prologue: Roadmap 1. Arbitrary Location 2. Mystery 3. Place 4. Things 5. People 6. Languages 7. Knowing 8…
Expand
2009
2009
Market efficiency of Brazilian exchange rate: Evidence from variance ratio statistics and technical trading rules
B. Tabak
,
Eduardo J. A. Lima
European Journal of Operational Research
2009
Corpus ID: 9188859
2009
2009
Cryptanalysis of DS-SIP Authentication Scheme Using ECDH
Eunjun Yoon
,
K. Yoo
International Conference on New Trends in…
2009
Corpus ID: 6933201
Session Initiation Protocol (SIP) is widely used in the current Internet protocols such as Hyper Text Transport Protocol (HTTP…
Expand
2009
2009
A New Authentication Scheme for Session Initiation Protocol
Eunjun Yoon
,
K. Yoo
Computational Intelligence in Security for…
2009
Corpus ID: 8571066
In 2008, Tsai proposed an efficient nonce-based authentication scheme for Session Initiation Protocol (SIP). The current paper…
Expand
2005
2005
Redressing the democratic deficit in treaty law making: (Re-) establishing a role for Parliament
J. Harrington
2005
Corpus ID: 158377301
2004
2004
Cryptanalysis and Improvement of Password Authenticated Key Exchange Scheme between Clients with Different Passwords
Jeeyeon Kim
,
Seungjoo Kim
,
Jin Kwak
,
Dongho Won
Communication Systems and Applications
2004
Corpus ID: 28300575
In ICICS’02, Byun et al. presented a new client to client password-authenticated key exchange(C2C-PAKE) protocol in a cross-realm…
Expand
2004
2004
1 EASTERN COYOTE HOME RANGE , TERRITORIALITY , AND SOCIALITY ON URBANIZED CAPE COD
J. Way
2004
Corpus ID: 157064606
We studied home range size, spatial arrangements, territoriality, and sociality of 11 radio-tagged eastern coyotes, Canis latrans…
Expand
1998
1998
Information warfare and security by Dorothy E. Denning
Jean-François Blanchette
Ethics and Information Technology
1998
Corpus ID: 28010929
The idea that “information societies” conduct “information warfare” is almost inevitable. If, as is argued, such societies…
Expand
1992
1992
A history of education in public health: health that mocks the doctors' rules
A. Hardy
Medicina e historia
1992
Corpus ID: 26516178
ELIZABETH FEE and ROY M. ACHESON (eds), A history of education in public health: health that mocks the doctors' rules, Oxford…
Expand
Review
1989
Review
1989
Knowledge Programming in Loops: Report on an Experimental Course
M. Stefik
,
D. Bobrow
,
S. Mittal
,
L. Conway
The AI Magazine
1989
Corpus ID: 2712977
Early this year fifty people took an experimental course at Xerox PARC on knowledge programming in Loops During the course, they…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE