Sold Out
Book Categories |
Acknowledgements | ||
Ch. 1 | Introduction | 1 |
Pt. I | Problem and context | |
Ch. 2 | An information society needs information security | 13 |
Ch. 3 | Cryptography, a key technology for information security | 33 |
Ch. 4 | Cryptocriminals, a public concern | 59 |
Ch. 5 | A survey of cryptography laws and regulations | 97 |
Pt. II | Framework and analysis | |
Ch. 6 | Framework and set of principles | 117 |
Ch. 6 1/2 | Outlawing cryptography | 125 |
Ch. 7 | LEAKing through the Public Key Infrastructure | 133 |
Ch. 8 | Demanding decryption | 167 |
Ch. 9 | Alternative investigation measures | 203 |
Ch. 10 | The zero option | 233 |
Ch. 11 | Reconciling interests | 237 |
Summary | 261 | |
Abbreviations | 267 | |
Glossary | 269 | |
Bibliography | 273 | |
About the author | 287 |
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionThe Crypto Controversy, Vol. 6
X
This Item is in Your InventoryThe Crypto Controversy, Vol. 6
X
You must be logged in to review the productsX
X
X
Add The Crypto Controversy, Vol. 6, Cryptography is essential for information security and electronic commerce, yet it can also be abused by criminals to thwart police wiretaps and computer searches. How should governments address this conflict of interests? Will they require people to depo, The Crypto Controversy, Vol. 6 to the inventory that you are selling on WonderClubX
X
Add The Crypto Controversy, Vol. 6, Cryptography is essential for information security and electronic commerce, yet it can also be abused by criminals to thwart police wiretaps and computer searches. How should governments address this conflict of interests? Will they require people to depo, The Crypto Controversy, Vol. 6 to your collection on WonderClub |