-
1
-
-
0012543218
-
The Steganographic File System
-
Portland, Oregon, USA, April
-
Ross Anderson, Roger Needham and Adi Shamir. The Steganographic File System. In Proc. Second International Information Hiding Workshop, Portland, Oregon, USA, April 1998.http://www.cl.cam.ac.uk/ftp/users/rja14/sfs3.ps.gz
-
(1998)
Proc. Second International Information Hiding Workshop
-
-
Anderson, R.1
Needham, R.2
Shamir, A.3
-
3
-
-
0013451643
-
-
New York: Penguin Books
-
James Bamford. The Puzzle Palace. New York: Penguin Books, 1983, pp. 126-7.
-
(1983)
The Puzzle Palace
, pp. 126-127
-
-
Bamford, J.1
-
5
-
-
84949508739
-
-
Hale v. Henkel, 201 U.S. 43, 74-75, March 1906
-
Hale v. Henkel, 201 U.S. 43, 74-75, March 1906.
-
-
-
-
6
-
-
84949512161
-
-
Channel 4 Television (UK), 6 October
-
Duncan Campbell. Dispatches: The Hill. Channel 4 Television (UK), 6 October 1993.
-
(1993)
Dispatches: The Hill
-
-
Campbell, D.1
-
8
-
-
84949523884
-
Document Retention/Destruction Policies
-
September
-
Ken Carroll. Document Retention/Destruction Policies. Miller & Martin Advisor, September 1998. http://www.millermartin.com/pubs/adv12-98-docret.htm
-
(1998)
Miller & Martin Advisor
-
-
Carroll, K.1
-
10
-
-
0019532104
-
Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms
-
February
-
D. Chaum. Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. Communications of the ACM, 24(2) 84-88, February 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
11
-
-
84949505120
-
-
April
-
Council of Europe. Draft Convention on Cyber-crime, April 2000. http://conventions.coe.int/treaty/en/projets/cybercrime.htm
-
(2000)
Draft Convention on Cyber-crime
-
-
-
12
-
-
84949527694
-
Travelers face jail if they refuse to let Customs scan their laptops
-
16 September
-
Simon Davies. Travelers face jail if they refuse to let Customs scan their laptops. The Daily Telegraph, 16 September 1998. http://www.sightings.com/political/laptops.htm
-
(1998)
The Daily Telegraph
-
-
Davies, S.1
-
16
-
-
84874800178
-
A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
-
July
-
T. Elgamal. A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. IEEE Transactions on Information Theory 31(4), July 1985, 469-472.
-
(1985)
IEEE Transactions on Information Theory
, vol.31
, Issue.4
, pp. 469-472
-
-
Elgamal, T.1
-
19
-
-
84949525947
-
Cases highlight need for e-mail policies
-
10 May
-
Roberta Fusaro. Cases highlight need for e-mail policies. ComputerWorld, 10 May 1998. http://www.computerworld.com/home/print.nsf/(frames)/9810056D2A?OpenDocument&~f
-
(1998)
ComputerWorld
-
-
Fusaro, R.1
-
20
-
-
84949523436
-
-
Post to ukcrypto@maillist.ox.ac.uk, July
-
Brian Gladman. DTI to ban electronic export of crypto from the UK! Post to ukcrypto@maillist.ox.ac.uk, July 1998. http://www.cs.ucl.ac.uk/staff/I.Brown/archives/ukcrypto/0898-1198/msg00060.html
-
(1998)
DTI to Ban Electronic Export of Crypto from the UK!
-
-
Gladman, B.1
-
21
-
-
84949522347
-
The Regulation of Investigatory Powers Bill - The Provisions for Government Access to Keys
-
February
-
Brian Gladman. The Regulation of Investigatory Powers Bill - The Provisions for Government Access to Keys. Foundation for Information Policy Research report, February 2000. http://www.fipr.org/rip/RIPGAKBG.pdf
-
(2000)
Foundation for Information Policy Research Report
-
-
Gladman, B.1
-
22
-
-
0005063385
-
Onion Routing for Anonymous and Private Internet Connections
-
February
-
David M. Goldschlag, Michael G. Reed, and Paul F. Syverson. Onion Routing for Anonymous and Private Internet Connections. Communications of the ACM 42(2), February 1999. http://www.onion-router.net/Publications/CACM-1999.ps
-
(1999)
Communications of the ACM
, vol.42
, Issue.2
-
-
Goldschlag, D.M.1
Reed, M.G.2
Syverson, P.F.3
-
23
-
-
84949507170
-
Smoking gun in Microsoft memos?
-
May
-
Dan Goodin and Jeff Pelline. Smoking gun in Microsoft memos? CNET News.com, May 1998. http://news.cnet.com/news/0-1003-200-329400.html
-
(1998)
CNET News.Com
-
-
Goodin, D.1
Pelline, J.2
-
27
-
-
84949521427
-
Helsingius shuts down anon.penet.fi server in Finland
-
August
-
Declan McCullagh. Helsingius shuts down anon.penet.fi server in Finland. Politech, August 1996. http://www.itu.reading.ac.uk/misc/mailing-lists/rre/00000167.htm
-
(1996)
Politech
-
-
McCullagh, D.1
-
29
-
-
84949485500
-
-
Posts to talk.politics.crypto, August
-
W. H. Murray. UK Customs Check for laptop porn. Posts to talk.politics.crypto, August 1998. http://privacy.nb.ca/cryptography/archives/cryptography/html/1998-08/0111.html
-
(1998)
UK Customs Check for Laptop Porn
-
-
Murray, W.H.1
-
30
-
-
84949511936
-
UK Customs check for laptop porn
-
13 August
-
Chris Nuttall. UK Customs check for laptop porn. BBC News Online, 13 August 1998. http://news.bbc.co.uk/hi/english/sci/tech/newsid-150000/150465.stm
-
(1998)
BBC News Online
-
-
Nuttall, C.1
-
32
-
-
84949484392
-
Intelligence Agency Budget and Personnel
-
July
-
John Pike. Intelligence Agency Budget and Personnel. Federation of American Scientists, July 1998. http://www.fas.org/irp/agency/budget1.htm
-
(1998)
Federation of American Scientists
-
-
Pike, J.1
-
34
-
-
0017930809
-
A Method for Obtaining Digital Signatures and Public-Key Cryptosystems
-
February
-
R. Rivest, A. Shamir and L. Adleman. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, 21(2) 120-126, February 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
35
-
-
33749438923
-
MI5 builds new centre to read e-mails on the net
-
30 April
-
Nicholas Rufford. MI5 builds new centre to read e-mails on the net. The Sunday Times, 30 April 2000. http://www.the-times.co.uk/news/pages/sti/2000/04/30/stinwenws01034.html
-
(2000)
The Sunday Times
-
-
Rufford, N.1
-
37
-
-
84949497989
-
-
17 CFR 240, 12 June
-
Securities and Exchange Commission. 17 CFR 240, 12 June 1995. http://www.sec.gov/rules/final/17a23.txt
-
(1995)
Securities and Exchange Commission
-
-
-
38
-
-
84949493227
-
Self Incrimination and Cryptographic Keys
-
February
-
Greg S. Sergienko. Self Incrimination and Cryptographic Keys. The Richmond Journal of Law and Technology 1, February 1996. http://www.richmond.edu/jolt/v2i1/sergienko.html
-
(1996)
The Richmond Journal of Law and Technology
, vol.1
-
-
Sergienko, G.S.1
-
39
-
-
84949499584
-
Mixing business with spying; secret information is passed routinely to US
-
1 November
-
Scott Shane. Mixing business with spying; secret information is passed routinely to US. Baltimore Sun, 1 November 1996.
-
(1996)
Baltimore Sun
-
-
Shane, S.1
-
40
-
-
84949500566
-
Records Retention Policies: When Is It Safe To Destroy Documents
-
January
-
Peter L. Simmons. Records Retention Policies: When Is It Safe To Destroy Documents. Fried, Frank, Harris, Shriver & Jacobson client memos, January 1997. http://www.ffhsj.com/firmpage/cmemos/131280.htm
-
(1997)
Fried, Frank, Harris, Shriver & Jacobson Client Memos
-
-
Simmons, P.L.1
-
41
-
-
0033489640
-
Secure dynamic adaptive traffic masking
-
Caledon Hills Canada, September
-
Brenda Timmerman. Secure dynamic adaptive traffic masking. Proc. New Security Paradigms Workshop, Caledon Hills Canada, September 1999.
-
(1999)
Proc. New Security Paradigms Workshop
-
-
Timmerman, B.1
-
42
-
-
0039263938
-
-
London: Faber and Faber
-
Mark Urban. UK Eyes Alpha. London: Faber and Faber, 1996, p.235.
-
(1996)
UK Eyes Alpha
, pp. 235
-
-
Urban, M.1
-
43
-
-
84949515788
-
U.S. Steps up commercial spying
-
7 May
-
Robert Windrem. U.S. steps up commercial spying. MSNBC News, 7 May 2000. http://msnbc.com/news/403435.asp?cp1=1
-
(2000)
MSNBC News
-
-
Windrem, R.1
-
44
-
-
84949492141
-
-
Foreign Press Center, Washington, DC briefing, 7 March
-
John Woolsey. Foreign Press Center, Washington, DC briefing, 7 March 2000. http://cryptome.org/echelon-cia.htm
-
(2000)
-
-
Woolsey, J.1
|