Keys under doormats
暂无分享,去创建一个
Matthew Green | Peter G. Neumann | Bruce Schneier | Harold Abelson | Ronald L. Rivest | Matt Blaze | Ross J. Anderson | Steven M. Bellovin | Daniel J. Weitzner | Susan Landau | Whitfield Diffie | Jeffrey I. Schiller | John Gilmore | Josh Benaloh | Michael A. Specter
[1] James B. Comey. Going Dark: Are Technology, Privacy, and Public Safety on a Collision Course? [presentation] , 2014 .
[2] Gavin Lowe,et al. An Attack on the Needham-Schroeder Public-Key Authentication Protocol , 1995, Inf. Process. Lett..
[3] Alfredo Pironti,et al. A Messy State of the Union: Taming the Composite State Machines of TLS , 2015, 2015 IEEE Symposium on Security and Privacy.
[4] Diomidis Spinellis,et al. The Athens Affair , 2007, IEEE Spectrum.
[5] Peter G. Neumann,et al. The risks of key recovery, key escrow, and trusted third-party encryption , 1997, World Wide Web J..
[6] Tom Cross. Exploiting Lawful Intercept to Wiretap the Internet , 2010 .
[7] Whitfield Diffie,et al. The export of cryptography in the 20th century and the 21st , 2001 .
[8] R. Brooks,et al. Computer Science and Artificial Intelligence Laboratory , 2005 .
[9] Roger M. Needham,et al. Using encryption for authentication in large networks of computers , 1978, CACM.
[10] Herbert S. Lin,et al. Cryptography's Role in Securing the Information Society (Роль криптографии в защите информационного общества) , 1996 .
[11] William J. Lynn,et al. Defending a New Domain: The Pentagon's Cyberstrategy , 2010 .
[12] Susan Landau,et al. Privacy on the Line: The Politics of Wiretapping and Encryption, Updated and Expanded Edition , 1998 .
[13] Matt Blaze,et al. Protocol failure in the escrowed encryption standard , 1994, CCS '94.