Singleton, 1998 - Google Patents
Encryption Policy for the 21st Century: A Future without Government-Prescribed Key RecoverySingleton, 1998
View PDF- Document ID
- 16449406856161868260
- Author
- Singleton S
- Publication year
External Links
Snippet
Encryption technology encodes computer files so that only someone with special knowledge, such as a unique secret" key," can read them. The widespread use of strong encryption technology is essential to protect consumers and businesses against spies …
- 238000011084 recovery 0 title abstract description 99
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Froomkin | Metaphor is the key: cryptography, the clipper chip, and the constitution | |
Keyser | The council of Europe convention on cybercrime | |
Denning et al. | Hiding crimes in cyberspace | |
US20030120949A1 (en) | Data security system and method associated with data mining | |
Sarmah et al. | A brief study on cyber crime and cyber laws of India | |
Koops | The crypto controversy: a key conflict in the information society | |
Usman | cyber crime: Pakistani perspective | |
Erbschloe | Social engineering: Hacking systems, nations, and societies | |
Sufriadi | Prevention efforts against e-commerce fraud based on Indonesian cyber law | |
Denning et al. | Encryption and evolving technologies: Tools of organized crime and terrorism | |
Singh et al. | Role of cyber cell to handle cyber crime within the public and private sector: an Indian case study | |
Antonyan et al. | New technologies in cyber terrorism countering | |
Tibbetts | Terrorist use of the Internet and related information technologies | |
Singleton | Encryption Policy for the 21st Century: A Future without Government-Prescribed Key Recovery | |
Grabosky et al. | Digital crime in the twenty-first century | |
Shearer et al. | Government, cryptography, and the right to privacy | |
Dolliver et al. | Understanding cybercrime | |
Klopfenstein | Deciphering the encryption debate: A constitutional analysis of current regulations and a prediction for the future | |
Halouzka et al. | Personal cyber security in email communication | |
Denning | Crime and crypto on the information superhighway | |
Carrell | Spying on the Mob: United States v. Scarfo-A Constitutional Analysis | |
Grabosky et al. | Digital Crime in the Twenty-First Century 1 | |
Akdeniz | UK government policy on encryption | |
Kumar | Cyber crime | |
Chandrakala | Cyber Crime Investigation and Law |