Thumbnail
Access Restriction
Subscribed

Author Gilmore, John ♦ Rivest, Ronald L. ♦ Neumann, Peter G. ♦ Blaze, Matt ♦ Benaloh, Josh ♦ Diffie, Whitfield "Whit" ♦ Green, Matthew ♦ Anderson, Ross ♦ Landau, Susan ♦ Schiller, Jeffrey I. ♦ Bellovin, Steven M. ♦ Weitzner, Daniel J. ♦ Abelson, Harold ♦ Schneier, Bruce ♦ Specter, Michael A.
Source ACM Digital Library
Content type Text
Publisher Association for Computing Machinery (ACM)
File Format PDF
Language English
Abstract Mandating insecurity by requiring government access to all data and communications.
Description Affiliation: Johns Hopkins University Information Security Institute (Green, Matthew) || University of Cambridge (Anderson, Ross) || Microsoft Research (Benaloh, Josh) || Worcester Polytechnic Institute (Landau, Susan) || SRI International (Neumann, Peter G.) || RSA Security and Verisign (Rivest, Ronald L.) || Columbia University (Bellovin, Steven M.) || University of Pennsylvania (Blaze, Matt) || Harvard Law School (Schneier, Bruce) || MIT (Abelson, Harold; Specter, Michael A.; Weitzner, Daniel J.) || Cygnus Solutions (Gilmore, John)
Age Range 18 to 22 years ♦ above 22 year
Educational Use Research
Education Level UG and PG
Learning Resource Type Article
Publisher Date 2005-08-01
Publisher Place New York
Journal Communications of the ACM (CACM)
Volume Number 58
Issue Number 10
Page Count 3
Starting Page 24
Ending Page 26


Open content in new tab

   Open content in new tab
Source: ACM Digital Library