Encryption: Difference between revisions
Jump to navigation
Jump to search
(→Links) |
(→Links) |
||
Line 23: | Line 23: | ||
*[http://www.technewsworld.com/story/60102.html ''The University's Role in Advancing Data Encryption, Part 2''] by Andrew Burger | *[http://www.technewsworld.com/story/60102.html ''The University's Role in Advancing Data Encryption, Part 2''] by Andrew Burger | ||
*[http://www.infoworld.com/archives/emailPrint.jsp?R=printThis&A=/article/07/12/19/Unlocking-encryption-management_1.html ''Unlocking encryption management''] by Matt Hines | *[http://www.infoworld.com/archives/emailPrint.jsp?R=printThis&A=/article/07/12/19/Unlocking-encryption-management_1.html ''Unlocking encryption management''] by Matt Hines | ||
*[http://en.wikipedia.org/wiki/Encryption ''Wikipedia Entry on Encryption''] | |||
*[http://computer.howstuffworks.com/encryption.htm ''How Encryption Works''] by Jeff Tyson |
Revision as of 20:27, 31 July 2008
Study Guide
What is Encryption?
Different Kinds of Encryption
Ethical Considerations
Links
These will be sorted later on.
- Ethical Considerations of Privacy and Cyber-Medical Information by Jonathan Klemens
- Ethical Considerations for Providing Professional Services Online by J.H. Yamamura and F.H. Grupe
- Federal government pushes full-disk encryption by Dennis Fisher
- Government buys encryption by Michael Mongold
- Federal encryption standardization by Douglas Schweitzer
- Your Encryption Key a Fifth Amendment Right?
- A Pretty Good Way to Foil the NSA by Ryan Singel
- Voice Encryption May Draw U.S. Scrutiny by John Markoff
- The University's Role in Advancing Data Encryption, Part 2 by Andrew Burger
- Unlocking encryption management by Matt Hines
- Wikipedia Entry on Encryption
- How Encryption Works by Jeff Tyson