Research Catalog
Building in big brother : the cryptographic policy debate / edited by Lance J. Hoffman.
- Title
- Building in big brother : the cryptographic policy debate / edited by Lance J. Hoffman.
- Publication
- New York : Springer-Verlag, c1995.
Items in the Library & Off-site
Filter by
1 Item
Status | Format | Access | Call Number | Item Location |
---|---|---|---|---|
Text | Request in advance | QA76.9.A25 B85 1995 | Off-site |
Holdings
Details
- Additional Authors
- Hoffman, Lance J.
- Description
- xvi, 560 p. : ill.; 24 cm.
- Subject
- Bibliography (note)
- Includes bibliographical references and index.
- Contents
- Ch. 1. Cryptography (From Julius Caesar through Public Key Cryptosystems): Methods to Keep Secrets Secret -- 1. Encryption / Deborah Russell and G. T. Gangemi, Sr -- 2. Data Encryption Devices: Overview Technology Analysis / Rebecca J. Duncan -- 3. Answers to Frequently Asked Questions about Today's Cryptography -- 4. Cryptography in Public: A Brief History -- 5. Internet Privacy Enhanced Mail / Stephen T. Kent -- 6. Privacy in Today's Wireless Environment / Kim Lawson-Jenkins -- 7. Federal Information Processing Standards Publication 186 (1994 May 19): Specifications for the Digital Signature Standard (DSS) -- 8. Federal Information Processing Standards Publication 180 (1993 May 11): Specifications for the Secure Hash Standard (SHS) -- 9. Pretty Good Privacy: Public Key Encryption for the Masses / Philip Zimmermann -- Ch. 2. Key Escrow Cryptosystems: Keeping Secrets Secret Except When... -- 1. U.S. Key Escrow Encryption Technology / Dorothy E. Denning -- 2. SKIPJACK Review: Interim Report / Ernest F. Brickell, Dorothy E. Denning, Stephen T. Kent, David P. Maher and Walter Tuchman -- 3. Protocol Failure in the Escrowed Encryption Standard / Matt Blaze -- 4. CAPSTONE Chip Technology -- 5. Fair Cryptosystems / Silvio Micali -- 6. Software Key Escrow: A Better Solution for Law Enforcement's Needs? / Stephen T. Walker -- 7. New Approach to Software Key Escrow Encryption / David M. Balenson, Carl M. Ellison, Steven B. Lipner and Stephen T. Walker -- 8. International Key Escrow Encryption: Proposed Objectives and Options / Dorothy E. Denning -- Ch. 3. U.S. Government Policy Solution: Key Escrow Cryptosystems, Policies, Procedures, and Legislation -- 1. Statement of the Press Secretary -- 2. Statement of the Vice President -- 3. Vice President's Letter to Representative Maria Cantwell / Albert Gore -- 4. Encryption -- Export Control Reform / Martha Harris -- 5. Attorney General Makes Key Escrow Announcements -- 6. Authorization Procedures for Release of Encryption Key Components in Conjunction with Intercepts Pursuant to Title III and FISA -- 7. Encryption Standards and Procedures Act of 1994 -- 8. Comments on Encryption Standards and Procedures Act -- Ch. 4. Policy Debate: How Controlled a Global Information Infrastructure do We Want, and Who Decides? -- 1. Cypherpunks vs. Uncle Sam / Steven Levy -- 2. Testimony Before the Subcommittee on Technology, Environment, and Aviation of the Committee on Science, Space, and Technology of the U.S. House of Representatives / Dorothy E. Denning -- 3. Wiretaps for a Wireless Age / David Gelernter -- 4. Don't Worry Be Happy / Stewart A. Baker -- 5. So, People, We Have a Fight on Our Hands / Bruce Sterling -- 6. Jackboots on the Infobahn / John Perry Barlow -- 7. 'Secret' Agency Steps Over the Line -- 8. Closer Look on Wiretapping -- Ch. 5. Law Enforcement: What Does It Cost to Commit a Perfect Crime? -- 1. Digital Telephony and Communications Privacy Improvement Act of 1994 -- 2. Summary Statement before the Subcommittee on Technology and the Law of the Committee on the Judiciary, United States Senate and the Subcommittee on Civil and Constitutional Rights of the Committee on the Judiciary, House of Representatives / Louis J. Freeh -- 3. EFF Statement on and Analysis of Digital Telephony Act -- 4. EPIC Statement on Wiretap Bill -- 5. Benefits and Costs of Legislation to Ensure the Government's Continued Capability to Investigate Crime with the Implementation of New Telecommunications Technologies -- 6. Digital Telephony -- Cost-Benefit Analysis / Betsy Anderson and Todd Buchholz -- 7. Digital Telephony -- Cost-Benefit Analysis / David McIntosh and James Gattuso -- 8. Digital Telephony -- Cost-Benefit Analysis / Ron Levy -- Ch. 6. Civil Liberties: Safeguarding Privacy (and More) in a Digital, Tappable Age -- 1. Impact of a Secret Cryptographic Standard on Encryption, Privacy, Law Enforcement and Technology / Whitfield Diffie -- 2. Genie Is Out of the Bottle / William M. Bulkeley -- 3. DPSWG Letter to President Clinton on Clipper -- 4. Cryptographic Issue Statements: Letter to the Computer System Security and Privacy Advisory Board -- 5. Constitutionality of Mandatory Key Escrow -- A First Look / A. Michael Froomkin -- 6. Review and Analysis of U.S. Laws, Regulations, and Case Laws Pertaining to the Use of Commercial Encryption Products for Voice and Data Communications / James Chandler, Diana Arrington, Lamarris Gill and Donna Berkelhammer -- 7. On Blind Signatures and Perfect Crimes / Sebastiaan von Solms and David Naccache -- Ch. 7. Export Policy: Prudent Controls in a Risky World or Making the World Safe for Foreign Competition? -- 1. Encryption's International Labyrinth / David S. Bernstein -- 2. Federal Policy Impact on U.S. Corporate Vulnerability to Economic Espionage / Geoffrey W. Turner -- 3. Testimony Before the Committee on the Judiciary Subcommittee on Technology and the Law of the United States Senate / Stephen T. Walker -- 4. Technology and Software Controls / Larry E. Christensen -- 5. State Department Ruling on Cryptographic Export Media -- 6. Constitutionality Under the First Amendment of ITAR Restrictions on Public Cryptography / John M. Harmon.
- ISBN
- 0387944419 (acid-free paper)
- LCCN
- ^^^95003758^
- OCLC
- 31901442
- Owning Institutions
- Harvard Library