Denning et al., 1996 - Google Patents
Decoding encryption policyDenning et al., 1996
- Document ID
- 18235516949754585292
- Author
- Denning D
- Baugh Jr W
- Publication year
- Publication venue
- Security Management
External Links
Snippet
The government has worked with the private sector to promote the use of strong computerized-information encryption inclusive of legitimate federal access. The Clinton administration has recently proposed a measure which would allow the general exportation …
- 239000003795 chemical substances by application 0 description 15
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US7191252B2 (en) | Data security system and method adjunct to e-mail, browser or telecom program | |
| US7140044B2 (en) | Data security system and method for separation of user communities | |
| US7322047B2 (en) | Data security system and method associated with data mining | |
| US7146644B2 (en) | Data security system and method responsive to electronic attacks | |
| US7349987B2 (en) | Data security system and method with parsing and dispersion techniques | |
| US7313825B2 (en) | Data security system and method for portable device | |
| Aldridge et al. | Security considerations of doing business via the Internet: cautions to be considered | |
| US7103915B2 (en) | Data security system and method | |
| US8826448B2 (en) | System, method and apparatus for electronically protecting data and digital content | |
| US7395436B1 (en) | Methods, software programs, and systems for electronic information security | |
| US7937579B2 (en) | System, method and apparatus for electronically protecting data and digital content | |
| Longley | Data security | |
| US11163893B2 (en) | Methods and systems for a redundantly secure data store using independent networks | |
| Denning et al. | Encryption and evolving technologies: Tools of organized crime and terrorism | |
| Landau et al. | Crypto policy perspectives | |
| Denning et al. | Key escrow encryption policies and technologies | |
| Denning et al. | Decoding encryption policy | |
| Curtin | Snake oil warning signs: Encryption software to avoid | |
| Lázaro | Forensic computing from a computer security perspective | |
| Singleton | Encryption Policy for the 21st Century: A Future without Government-Prescribed Key Recovery | |
| Earp et al. | The newest technology tools:(Un) Limited access? | |
| Denning et al. | Encryption and evolving technologies: Tools of organized crime and terrorism: US Working Group on Organized Crime, National Strategy Information Center, Washington, DC, July, 1997 | |
| Armstrong et al. | Who has the keys to the vault? Protecting secrets on Laptops | |
| Weller et al. | Introduction to the New Mainframe: Security | |
| Rosenblum | Achieving PCI compliance with storage security systems |