[go: up one dir, main page]

Singleton, 1998 - Google Patents

Encryption Policy for the 21st Century: A Future without Government-Prescribed Key Recovery

Singleton, 1998

View PDF
Document ID
16449406856161868260
Author
Singleton S
Publication year

External Links

Snippet

Encryption technology encodes computer files so that only someone with special knowledge, such as a unique secret" key," can read them. The widespread use of strong encryption technology is essential to protect consumers and businesses against spies …
Continue reading at www.cei.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards

Similar Documents

Publication Publication Date Title
Froomkin Metaphor is the key: cryptography, the clipper chip, and the constitution
Keyser The council of Europe convention on cybercrime
Denning et al. Hiding crimes in cyberspace
US20030120949A1 (en) Data security system and method associated with data mining
Sarmah et al. A brief study on cyber crime and cyber laws of India
Koops The crypto controversy: a key conflict in the information society
Usman cyber crime: Pakistani perspective
Erbschloe Social engineering: Hacking systems, nations, and societies
Sufriadi Prevention efforts against e-commerce fraud based on Indonesian cyber law
Denning et al. Encryption and evolving technologies: Tools of organized crime and terrorism
Singh et al. Role of cyber cell to handle cyber crime within the public and private sector: an Indian case study
Antonyan et al. New technologies in cyber terrorism countering
Tibbetts Terrorist use of the Internet and related information technologies
Singleton Encryption Policy for the 21st Century: A Future without Government-Prescribed Key Recovery
Grabosky et al. Digital crime in the twenty-first century
Shearer et al. Government, cryptography, and the right to privacy
Dolliver et al. Understanding cybercrime
Klopfenstein Deciphering the encryption debate: A constitutional analysis of current regulations and a prediction for the future
Halouzka et al. Personal cyber security in email communication
Denning Crime and crypto on the information superhighway
Carrell Spying on the Mob: United States v. Scarfo-A Constitutional Analysis
Grabosky et al. Digital Crime in the Twenty-First Century 1
Akdeniz UK government policy on encryption
Kumar Cyber crime
Chandrakala Cyber Crime Investigation and Law