Risking Communications Security: Potential Hazards of the Protect America Act
暂无分享,去创建一个
Peter G. Neumann | Matt Blaze | Steven M. Bellovin | Jennifer Rexford | Susan Landau | Whitfield Diffie | J. Rexford | S. Landau | W. Diffie | M. Blaze | S. Bellovin | P. Neumann
[1] G. Hale,et al. National Research Council , 1923, Journal of the American Institute of Electrical Engineers.
[2] S. Resolution. SELECT COMMITTEE TO STUDY GOVERNMENTAL OPERATIONS WITH RESPECT TO INTELLIGENCE ACTIVITIES , 1976 .
[3] Matt Blaze,et al. Protocol failure in the escrowed encryption standard , 1994, CCS '94.
[4] F. Schneider. Trust in Cyberspace , 1998 .
[5] Susan Landau,et al. Privacy on the Line: The Politics of Wiretapping and Encryption, Updated and Expanded Edition , 1998 .
[6] Daniel J. Solove,et al. Information Privacy Law , 2003 .
[7] Corinna Cortes,et al. Computational Methods for Dynamic Graphs , 2003 .
[8] K. Leuven,et al. Introducing Traffic Analysis Attacks , Defences and Public Policy Issues . . . ( Invited Talk ) , 2005 .
[9] Richard Clayton,et al. Anonymity and traceability in cyberspace , 2005 .
[10] Susan Landau. National Security on the Line , 2006, J. Telecommun. High Technol. Law.
[11] E. Brickell,et al. Security Implications of Applying the Communications Assistance to Law Enforcement Act to Voice over IP , 2006 .
[12] Diomidis Spinellis,et al. The Athens Affair , 2007, IEEE Spectrum.
[13] chearings. Serial No. 110-21: Inspector General's Independent Report on the FBI's Use of National Security Letters: Hearing before the Committee on the Judiciary, U.S. House of Representatives, One Hundred Tenth Congress, First Session, March 20, 2007 , 2007 .
[14] Kim-Kwang Raymond Choo. Privacy on the Line: The Politics of Wiretapping and Encryption, Updated and Expanded Edition , 2008, The Computer Journal.