Encryption: Difference between revisions

From Expertiza_Wiki
Jump to navigation Jump to search
Line 18: Line 18:
*[http://securityblog.typepad.com/technology_security/2007/06/government_buys.html ''Government buys encryption''] by Michael Mongold
*[http://securityblog.typepad.com/technology_security/2007/06/government_buys.html ''Government buys encryption''] by Michael Mongold
*[http://blogs.computerworld.com/federal_encryption_standardization ''Federal encryption standardization''] by Douglas Schweitzer
*[http://blogs.computerworld.com/federal_encryption_standardization ''Federal encryption standardization''] by Douglas Schweitzer
*[http://www.dslreports.com/shownews/Your-Encryption-Key-a-Fifth-Amendment-Right-90282 http://www.dslreports.com/shownews/Your-Encryption-Key-a-Fifth-Amendment-Right-90282]
*[http://www.dslreports.com/shownews/Your-Encryption-Key-a-Fifth-Amendment-Right-90282 ''Your Encryption Key a Fifth Amendment Right?'']
*[http://www.wired.com/news/technology/0,70524-0.html?tw=wn_index_1 http://www.wired.com/news/technology/0,70524-0.html?tw=wn_index_1]
*[http://www.wired.com/news/technology/0,70524-0.html?tw=wn_index_1 ''A Pretty Good Way to Foil the NSA''] by Ryan Singel
*[http://www.nytimes.com/2006/05/22/technology/22privacy.html http://www.nytimes.com/2006/05/22/technology/22privacy.html]
*[http://www.nytimes.com/2006/05/22/technology/22privacy.html ''Voice Encryption May Draw U.S. Scrutiny''] by John Markoff
*[http://www.usatoday.com/money/industries/technology/2006-02-16-skype-wiretap http://www.usatoday.com/money/industries/technology/2006-02-16-skype-wiretap]
*[http://www.usatoday.com/money/industries/technology/2006-02-16-skype-wiretap http://www.usatoday.com/money/industries/technology/2006-02-16-skype-wiretap]
*[http://www.technewsworld.com/story/60102.html http://www.technewsworld.com/story/60102.html]
*[http://www.technewsworld.com/story/60102.html http://www.technewsworld.com/story/60102.html]
*[http://www.infoworld.com/archives/emailPrint.jsp?R=printThis&A=/article/07/12/19/Unlocking-encryption-management_1.html http://www.infoworld.com/archives/emailPrint.jsp?R=printThis&A=/article/07/12/19/Unlocking-encryption-management_1.html]
*[http://www.infoworld.com/archives/emailPrint.jsp?R=printThis&A=/article/07/12/19/Unlocking-encryption-management_1.html http://www.infoworld.com/archives/emailPrint.jsp?R=printThis&A=/article/07/12/19/Unlocking-encryption-management_1.html]

Revision as of 20:20, 31 July 2008