Author: Dorothy E. Denning

Publications

Publication period start: 1995
Number of co-authors: 21

Co-authors

Number of publications with favourite co-authors
David Sobel
1
Jeffrey G. Long
1
Peter J. Denning
2

Productive Colleagues

Most productive colleagues in number of publications
Ronald L. Rivest
9
Peter J. Denning
64
Peter G. Neumann
105

Publications

Denning, Peter J., Denning, Dorothy E. (2004): Artificial stupidity. In Communications of the ACM, 47 (5) pp. 112. https://dl.acm.org/doi/10.1145/986213.986246

Long, Jeffrey G., Denning, Dorothy E. (1995): Ultra-Structure: A Design Theory for Complex Systems and Processes. In Communications of the ACM, 38 (1) pp. 103-120.

Landau, Susan, Kent, Stephen T., Brooks, Clint, Charney, Scott, Denning, Dorothy E., Diffie, Whitfield, Lauck, Anthony, Miller, Douglas, Neumann, Peter G., Sobel, David (1994): Crypto Policy Perspectives. In Communications of the ACM, 37 (8) pp. 115-121.

Denning, Dorothy E., Godwin, Mike, Bayse, William A., Rotenberg, Marc, Branscomb, Lewis M., Branscomb, Anne M., Rivest, Ronald L., Grosso, Andrew, Marx, Gary T. (1993): To Tap or not to Tap. In Communications of the ACM, 36 (3) pp. 24-44.

Denning, Dorothy E. (1991): The United States vs. Craig Neidorf: A Debate on Electronic Publishing, Constitutional Rig. In Communications of the ACM, 34 (3) pp. 22-43.

Denning, Dorothy E. (1984): Digital Signatures with RSA and Other Public-Key Cryptosystems. In Communications of the ACM, 27 (4) pp. 388-392.

Denning, Dorothy E., Schlorer, Jan (1983): Inference Controls for Statistical Databases. In IEEE Computer, 16 (7) pp. 69-82.

Denning, Dorothy E., Sacco, Giovanni Maria (1981): Timestamps in Key Distribution Protocols. In Communications of the ACM, 24 (8) pp. 533-536.

Denning, Dorothy E. (1979): Secure Personal Computing in an Insecure Network. In Communications of the ACM, 22 (8) pp. 476-482.

Denning, Dorothy E., Denning, Peter J. (1977): Certification of Programs for Secure Information Flow. In Communications of the ACM, 20 (7) pp. 504-513.

Denning, Dorothy E. (1976): A Lattice Model of Secure Information Flow. In Communications of the ACM, 19 (5) pp. 236-243.

New to UX Design? We're Giving You a Free eBook!

The Basics of User Experience Design

Download our free ebook “The Basics of User Experience Design” to learn about core concepts of UX design.

In 9 chapters, we’ll cover: conducting user interviews, design thinking, interaction design, mobile UX design, usability, UX research, and many more!

A valid email address is required.
315,105 designers enjoy our newsletter—sure you don’t want to receive it?

New to UX Design? We're Giving You a Free eBook!

The Basics of User Experience Design

Download our free ebook “The Basics of User Experience Design” to learn about core concepts of UX design.

In 9 chapters, we’ll cover: conducting user interviews, design thinking, interaction design, mobile UX design, usability, UX research, and many more!

A valid email address is required.
315,105 designers enjoy our newsletter—sure you don’t want to receive it?