Encryption: Difference between revisions
Jump to navigation
Jump to search
(→Links) |
(→Links) |
||
Line 21: | Line 21: | ||
*[http://www.wired.com/news/technology/0,70524-0.html?tw=wn_index_1 ''A Pretty Good Way to Foil the NSA''] by Ryan Singel | *[http://www.wired.com/news/technology/0,70524-0.html?tw=wn_index_1 ''A Pretty Good Way to Foil the NSA''] by Ryan Singel | ||
*[http://www.nytimes.com/2006/05/22/technology/22privacy.html ''Voice Encryption May Draw U.S. Scrutiny''] by John Markoff | *[http://www.nytimes.com/2006/05/22/technology/22privacy.html ''Voice Encryption May Draw U.S. Scrutiny''] by John Markoff | ||
*[http://www.technewsworld.com/story/60102.html ''The University's Role in Advancing Data Encryption, Part 2''] by Andrew Burger | |||
*[http://www.technewsworld.com/story/60102.html | *[http://www.infoworld.com/archives/emailPrint.jsp?R=printThis&A=/article/07/12/19/Unlocking-encryption-management_1.html ''Unlocking encryption management''] by Matt Hines | ||
*[http://www.infoworld.com/archives/emailPrint.jsp?R=printThis&A=/article/07/12/19/Unlocking-encryption-management_1.html |
Revision as of 20:22, 31 July 2008
Study Guide
What is Encryption?
Different Kinds of Encryption
Ethical Considerations
Links
These will be sorted later on.
- Ethical Considerations of Privacy and Cyber-Medical Information by Jonathan Klemens
- Ethical Considerations for Providing Professional Services Online by J.H. Yamamura and F.H. Grupe
- Federal government pushes full-disk encryption by Dennis Fisher
- Government buys encryption by Michael Mongold
- Federal encryption standardization by Douglas Schweitzer
- Your Encryption Key a Fifth Amendment Right?
- A Pretty Good Way to Foil the NSA by Ryan Singel
- Voice Encryption May Draw U.S. Scrutiny by John Markoff
- The University's Role in Advancing Data Encryption, Part 2 by Andrew Burger
- Unlocking encryption management by Matt Hines