[go: up one dir, main page]

Denning et al., 1996 - Google Patents

Decoding encryption policy

Denning et al., 1996

Document ID
18235516949754585292
Author
Denning D
Baugh Jr W
Publication year
Publication venue
Security Management

External Links

Snippet

The government has worked with the private sector to promote the use of strong computerized-information encryption inclusive of legitimate federal access. The Clinton administration has recently proposed a measure which would allow the general exportation …
Continue reading at go.gale.com (other versions)

Similar Documents

Publication Publication Date Title
US7191252B2 (en) Data security system and method adjunct to e-mail, browser or telecom program
US7140044B2 (en) Data security system and method for separation of user communities
US7322047B2 (en) Data security system and method associated with data mining
US7146644B2 (en) Data security system and method responsive to electronic attacks
US7349987B2 (en) Data security system and method with parsing and dispersion techniques
US7313825B2 (en) Data security system and method for portable device
Aldridge et al. Security considerations of doing business via the Internet: cautions to be considered
US7103915B2 (en) Data security system and method
US8826448B2 (en) System, method and apparatus for electronically protecting data and digital content
US7395436B1 (en) Methods, software programs, and systems for electronic information security
US7937579B2 (en) System, method and apparatus for electronically protecting data and digital content
Longley Data security
US11163893B2 (en) Methods and systems for a redundantly secure data store using independent networks
Denning et al. Encryption and evolving technologies: Tools of organized crime and terrorism
Landau et al. Crypto policy perspectives
Denning et al. Key escrow encryption policies and technologies
Denning et al. Decoding encryption policy
Curtin Snake oil warning signs: Encryption software to avoid
Lázaro Forensic computing from a computer security perspective
Singleton Encryption Policy for the 21st Century: A Future without Government-Prescribed Key Recovery
Earp et al. The newest technology tools:(Un) Limited access?
Denning et al. Encryption and evolving technologies: Tools of organized crime and terrorism: US Working Group on Organized Crime, National Strategy Information Center, Washington, DC, July, 1997
Armstrong et al. Who has the keys to the vault? Protecting secrets on Laptops
Weller et al. Introduction to the New Mainframe: Security
Rosenblum Achieving PCI compliance with storage security systems