-
1
-
-
0011716149
-
Trust in a cryptographic economy and digital security deposits: Protocols and policies
-
Massachusetts Institute of Technology
-
Joseph M. Reagle Jr., 1996. "Trust in a cryptographic economy and digital security deposits: Protocols and policies," Master of Science in Technology and Policy Thesis, Massachusetts Institute of Technology, http://rpcp.mit.edu/∼reagle/commerce/commerce.html
-
(1996)
Master of Science in Technology and Policy Thesis
-
-
Reagle Jr., J.M.1
-
2
-
-
0029700344
-
Decentralized trust management
-
J. May 6-8, 1996, Oakland, Calif.
-
I borrow the term "trust management" from M. Blaze, J. Feigenbaum, J. and Lacy, 1996. "Decentralized trust management," Proceedings of the IEEE Symposium on Security and Privacy, May 6-8, 1996, Oakland, Calif.
-
(1996)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy3
-
5
-
-
0002863367
-
Valuation of trust in open networks
-
Proceedings of the European Symposium on Research in Computer Security (ESORICS)
-
T. Beth, M. Borcherding, and B. Klein, 1994. "Valuation of trust in open networks," Proceedings of the European Symposium on Research in Computer Security (ESORICS), vol. LNCS 875, pp. 3-18;
-
(1994)
LNCS
, vol.875
, pp. 3-18
-
-
Beth, T.1
Borcherding, M.2
Klein, B.3
-
9
-
-
33751505476
-
Crypto + Economics + AI = Digital Money Economies
-
The Cypherpunks list is archives
-
T. C. May, 1995. "Crypto + Economics + AI = Digital Money Economies," Cypherpunks. The Cypherpunks list is archives at http://www.hks.net/cpunks/index.html
-
(1995)
Cypherpunks
-
-
May, T.C.1
-
11
-
-
0025386404
-
A Logic of authentication
-
M. Abadi, M. Burrows, and R. Needham, 1990. "A Logic of authentication," ACM Transactions on Computer Systems, vol. 8, no. 1, pp. 18-36;
-
(1990)
ACM Transactions on Computer Systems
, vol.8
, Issue.1
, pp. 18-36
-
-
Abadi, M.1
Burrows, M.2
Needham, R.3
-
13
-
-
0027266208
-
Trust relationships in secure systems - A Distributed authentication perspective
-
R. Yahalom, B. Klein, and T. Beth, 1993. "Trust relationships in secure systems - A Distributed authentication perspective," Proceedings of the 1993 IEEE Symposium on Research in Security and Privacy, p. 152. In this paper, the authors provide an interesting table of functions for which principles are often trusted to do: identification, key generation, escrow, non-interference, clock synchronization, protocol compliance, and providing information about others' trustworthiness or reputation.
-
(1993)
Proceedings of the 1993 IEEE Symposium on Research in Security and Privacy
, pp. 152
-
-
Yahalom, R.1
Klein, B.2
Beth, T.3
-
15
-
-
0002863367
-
Valuation of trust in open networks
-
Proceedings of the European Symposium on Research in Computer Security (ESORICS)
-
T. Beth, M. Borcherding, and B. Klein, 1994. "Valuation of trust in open networks," Proceedings of the European Symposium on Research in Computer Security (ESORICS), vol. LNCS 875, p. 3.
-
(1994)
LNCS
, vol.875
, pp. 3
-
-
Beth, T.1
Borcherding, M.2
Klein, B.3
-
16
-
-
0002863367
-
Valuation of trust in open networks
-
Proceedings of the European Symposium on Research in Computer Security (ESORICS)
-
T. Beth, M. Borcherding, and B. Klein, 1994. "Valuation of trust in open networks," Proceedings of the European Symposium on Research in Computer Security (ESORICS), vol. LNCS 875, p. 5. The interesting constraint of this analysis is that any negative experience destroys any direct trust relationship.
-
(1994)
LNCS
, vol.875
, pp. 5
-
-
Beth, T.1
Borcherding, M.2
Klein, B.3
-
17
-
-
0002863367
-
Valuation of trust in open networks
-
T. Beth, M. Borcherding, and B. Klein, 1994. "Valuation of trust in open networks," LNCS 875, p. 5. Op. cit.
-
(1994)
LNCS
, vol.875
, pp. 5
-
-
Beth, T.1
Borcherding, M.2
Klein, B.3
-
18
-
-
0002863367
-
Valuation of trust in open networks
-
Proceedings of the European Symposium on Research in Computer Security (ESORICS)
-
T. Beth, M. Borcherding, and B. Klein, 1994. "Valuation of trust in open networks," Proceedings of the European Symposium on Research in Computer Security (ESORICS), vol. LNCS 875, pp. 3-18.
-
(1994)
LNCS
, vol.875
, pp. 3-18
-
-
Beth, T.1
Borcherding, M.2
Klein, B.3
-
19
-
-
53349155300
-
-
note
-
The term trust is often used in two contrary ways which can be confusing. On one hand, "I don't trust that person," means one has a low expectation of individual assertions being true, and the consequent risk is higher. Risk is the inverse of trust. There is also the concept of, "the less risk there is, the less I need to trust the person." Trust and risk are related linearly. However, the second statement is speaking about the need of trust to overcome some amount of risk. Rather than this being the expectation of an assertion being true, one is expressing the existence of risk (or variance in one's expectation) but that one will act upon the assertion regardless. For most of this paper, I will use "trust" in the first sense.
-
-
-
-
20
-
-
53349131476
-
Choice under uncertainty
-
Chapter 5 of Englewood Cliffs, N. J.: Prentice-Hall, entitled
-
Chapter 5 of R. S. Pindyck and D. L. Rubinfeld, 1995. Microeconomics. Englewood Cliffs, N. J.: Prentice-Hall, entitled "Choice under uncertainty," provides an economic treatment of uncertainty.
-
(1995)
Microeconomics
-
-
Pindyck, R.S.1
Rubinfeld, D.L.2
-
24
-
-
53349170039
-
-
note
-
There is a significant amount to be gained by establishing stable long standing trust relationships or certification agencies so as to avoid such calculations for the most part.
-
-
-
-
26
-
-
53349111330
-
-
note
-
I must caution that the case in this part of the paper is an example of a perfect information problem. The nature of information is much more general (the whole market). As such, I found it useful to break up the two cases to demonstrate that credit agencies could provide a wide range of information in depth, breadth, and detail regardless of whether the information was theoretically perfect or imperfect.
-
-
-
-
28
-
-
0011716149
-
Trust in a cryptographic economy and digital security deposits: Protocols and policies
-
Massachusetts Institute of Technology
-
See Joseph M. Reagle Jr., 1996. "Trust in a cryptographic economy and digital security deposits: Protocols and policies," Master of Science in Technology and Policy Thesis, Massachusetts Institute of Technology, http://rpcp.mit.edu/∼reagle/commerce/commerce.html
-
(1996)
Master of Science in Technology and Policy Thesis
-
-
Reagle Jr., J.M.1
-
29
-
-
53349138253
-
-
note
-
Within the confines of the philosophical issue of "in as far as we can know what is true."
-
-
-
-
30
-
-
53349138255
-
-
cypherpunks@toad.com: Tuesday, 21 Nov 1995 Cypherpunks' archives can be found
-
H. Finney and W. Dai, 1995. "Re: Towards a Theory of Reputation," cypherpunks@toad.com: Tuesday, 21 Nov 1995 15:32:08 -0800. Cypherpunks' archives can be found at http://www.hks.net/cpunks/index.html
-
(1995)
Re: Towards a Theory of Reputation
, vol.15
, Issue.32
, pp. 08-0800
-
-
Finney, H.1
Dai, W.2
-
31
-
-
33751514246
-
-
New York: Wiley
-
Certainly, reputation already plays a key part of many Internet communities including Internet Relay Chat (IRC), backgammon servers, chess servers, Netrek, and MUDS. For more details on some these environments, see Joe Pantusoi, Will Moss, Rawn Shah, and Jim Romine, 1996. The Complete Internet gamer. New York: Wiley.
-
(1996)
The Complete Internet Gamer
-
-
Pantusoi, J.1
Moss, W.2
Shah, R.3
Romine, J.4
-
32
-
-
53349138255
-
-
cypherpunks@toad.com: Tuesday, 21 Nov 1995 cypherpunks' archives
-
In H. Finney and W. Dai, 1995. "Re: Towards a Theory of Reputation," cypherpunks@toad.com: Tuesday, 21 Nov 1995 15:32:08 -0800; cypherpunks' archives at http://www.hks.net/cpunks/index.html
-
(1995)
Re: Towards a Theory of Reputation
, vol.15
, Issue.32
, pp. 08-0800
-
-
Finney, H.1
Dai, W.2
-
35
-
-
33748697387
-
The Place of information in economics
-
R. E. Babe (ed.), Boston: Kluwer
-
For work on information economics, see R. E. Babe, 1993. "The Place of information in economics," In: R. E. Babe (ed.), Information and communications in economics, Boston: Kluwer,
-
(1993)
Information and Communications in Economics
-
-
Babe, R.E.1
-
36
-
-
33751513727
-
-
J. Eatwell, M. Milgate, and P. Newman, eds., London: Macmillan Reference
-
and, J. Eatwell, M. Milgate, and P. Newman, eds., 1989. The New Palgrave: Allocation, information and markets. London: Macmillan Reference.
-
(1989)
The New Palgrave: Allocation, Information and Markets
-
-
-
39
-
-
84947990836
-
Endorsements, licensing, and insurance for distributed system services
-
Nov. 94
-
C. Lai, G. Medvinsky, and B. C. Neuman, 1994. "Endorsements, licensing, and insurance for distributed system services," Proceedings of the Second ACM Conference on Computer and Communications Security, Nov. 94.
-
(1994)
Proceedings of the Second ACM Conference on Computer and Communications Security
-
-
Lai, C.1
Medvinsky, G.2
Neuman, B.C.3
-
40
-
-
53349138255
-
-
cypherpunks@toad.com: Tuesday, 21 Nov 1995 archives
-
H. Finney and W. Dai, 1995. "Re: Towards a Theory of Reputation," cypherpunks@toad.com: Tuesday, 21 Nov 1995 15:32:08 -0800; archives at http://www.hks.net/cpunks/index.html
-
(1995)
Re: Towards a Theory of Reputation
, vol.15
, Issue.32
, pp. 08-0800
-
-
Finney, H.1
Dai, W.2
-
42
-
-
0001980141
-
The Evolution of strategies in the iterated prisoner's dilemma
-
L. Davis, ed. London: Pittman
-
R. Axelrod, 1987. "The Evolution of strategies in the iterated prisoner's dilemma," in L. Davis, ed. Genetic algorithms & simulated annealing. London: Pittman;
-
(1987)
Genetic Algorithms & Simulated Annealing
-
-
Axelrod, R.1
-
45
-
-
0002404001
-
-
Working Paper for the Santa Fe Institute Economics Research Program, no. 95-06-052, abstract
-
D. F. Midgley, R. E. Marks, and L. G. Cooper, 1995. "Breeding competitive strategies," Working Paper for the Santa Fe Institute Economics Research Program, no. 95-06-052, p. 3; abstract at http://www.santafe.edu/sfi/ publications/Abstracts/95-06-052abs.html
-
(1995)
Breeding Competitive Strategies
, pp. 3
-
-
Midgley, D.F.1
Marks, R.E.2
Cooper, L.G.3
-
46
-
-
53349155297
-
-
Working Paper for the Santa Fe Institute Economics Research Program, no. 95-04-041, abstract
-
L. K. Eisenberg, 1995. "Connectivity and financial network shutdown," Working Paper for the Santa Fe Institute Economics Research Program, no. 95-04-041, abstract at http://www.santafe.edu/sfi/publications/ Abstracts/95-04-041abs.html;
-
(1995)
Connectivity and Financial Network Shutdown
-
-
Eisenberg, L.K.1
-
47
-
-
0000735601
-
Money as a medium of exchange in an economy with artificially intelligent agents
-
R. Marimon, E. McGrattan, and T. J. Sargent, 1990. "Money as a medium of exchange in an economy with artificially intelligent agents," Journal of Economic Dynamics and Control, vol. 14, pp. 329-373;
-
(1990)
Journal of Economic Dynamics and Control
, vol.14
, pp. 329-373
-
-
Marimon, R.1
McGrattan, E.2
Sargent, T.J.3
-
48
-
-
0002404001
-
-
Working Paper for the Santa Fe Institute Economics Research Program, no. 95-06-052, abstract
-
D. F. Midgley, R. E. Marks, and L. G. Cooper, 1995. "Breeding competitive strategies," Working Paper for the Santa Fe Institute Economics Research Program, no. 95-06-052, abstract at http://www.santafe.edu/sfi/ publications/Abstracts/95-06-052abs.html;
-
(1995)
Breeding Competitive Strategies
-
-
Midgley, D.F.1
Marks, R.E.2
Cooper, L.G.3
-
49
-
-
53349132601
-
-
Working Paper for the Santa Fe Institute Economics Research Program, no. 95-03-037, PostScript version available
-
I. Karatzas, M. Shubik, and W. D. Sudderth, 1995. "A Strategic market game with secured lending," Working Paper for the Santa Fe Institute Economics Research Program, no. 95-03-037, PostScript version available at http://www.santafe.edu/sfi/publications/Workinq-Papers/95-03-037.ps;
-
(1995)
A Strategic Market Game with Secured Lending,"
-
-
Karatzas, I.1
Shubik, M.2
Sudderth, W.D.3
-
50
-
-
53349138254
-
-
Working Paper for the Santa Fe Institute Economics Research Program, no. 95-01-004, PostScript version available
-
D. Lane, F. Malerba, R. Maxfield, and L. Orsenigo, 1995. "Choice and action," Working Paper for the Santa Fe Institute Economics Research Program, no. 95-01-004, PostScript version available at http://www.santafe.edu/ sfi/publications/Workinq-Papers/95-01-004.ps;
-
(1995)
Choice and Action
-
-
Lane, D.1
Malerba, F.2
Maxfield, R.3
Orsenigo, L.4
-
51
-
-
53349131473
-
-
Working Paper for the Santa Fe Institute Economics Research Program, no. 95-03-034, abstract
-
and, S. H. Paskov and J. F. Traub, 1995. "Faster valuation of financial derivatives," Working Paper for the Santa Fe Institute Economics Research Program, no. 95-03-034, abstract at http://www.santafe.edu/sfi/ publications/Abstracts/95-03-034abs.html
-
(1995)
Faster Valuation of Financial Derivatives
-
-
Paskov, S.H.1
Traub, J.F.2
-
53
-
-
0042618199
-
-
Working Paper for the Santa Fe Institute Economics Research Program, no. 94-03-013, abstract
-
and, N. J. Vriend, 1994, "Self-Organized markets in a decentralized economy," Working Paper for the Santa Fe Institute Economics Research Program, no. 94-03-013, abstract at http://www.santafe.edu/sfi/publications/ Abstracts/94-03-013abs.html
-
(1994)
Self-Organized Markets in a Decentralized Economy
-
-
Vriend, N.J.1
-
54
-
-
0039248599
-
The Economy of ideas
-
J. P. Barlow, 1994. "The Economy of ideas," Wired, vol. 2, no. 3, p. 84;
-
(1994)
Wired
, vol.2
, Issue.3
, pp. 84
-
-
Barlow, J.P.1
-
55
-
-
33751543692
-
Can the conventional models apply? The Microeconomics of the information revolution
-
New York, New York (July 11-12, 1995), abstract
-
B. Don and D. Frelinger, 1995. "Can the conventional models apply? The Microeconomics of the information revolution," First USENIX Workshop on electronic commerce, New York, New York (July 11-12, 1995), abstract at http://www.usenix.org/publications/library/proceedinqs/ec95/don.html;
-
(1995)
First USENIX Workshop on Electronic Commerce
-
-
Don, B.1
Frelinger, D.2
-
56
-
-
85094637842
-
Economic mechanism design for computerized agents
-
New York, New York (July 11-12, 1995), abstract
-
and, H. R. Varian, 1995. "Economic mechanism design for computerized agents," First USENIX Workshop on electronic commerce, New York, New York (July 11-12, 1995), abstract at http://www.usenix.org/publications/library/ proceedinqs/ec95/varian.html
-
(1995)
First USENIX Workshop on Electronic Commerce
-
-
Varian, H.R.1
-
57
-
-
0011468734
-
Intellectual Value
-
E. Dyson, 1995. "Intellectual Value," Wired, vol. 3, no. 7, p. 137, and at http://www.hotwired.com/wired/3.07/features/dyson.html;
-
(1995)
Wired
, vol.3
, Issue.7
, pp. 137
-
-
Dyson, E.1
-
58
-
-
33751513727
-
-
J. Eatwell, M. Milgate, and P. Newman, eds., London: Macmillan Reference
-
J. Eatwell, M. Milgate, and P. Newman, eds., 1989. The New Palgrave: Allocation, information and markets. London: Macmillan Reference;
-
(1989)
The New Palgrave: Allocation, Information and Markets
-
-
-
59
-
-
0006298384
-
The Evolution of economic institutions as a propaganda process
-
and, U. Witt, 1989. "The Evolution of economic institutions as a propaganda process," Public Choice, vol. 62, pp. 155-172.
-
(1989)
Public Choice
, vol.62
, pp. 155-172
-
-
Witt, U.1
-
64
-
-
84947990836
-
Endorsements, licensing, and insurance for distributed system services
-
Nov. 94
-
C. Lai, G. Medvinsky, and B. C. Neuman, 1994. "Endorsements, licensing, and insurance for distributed system services," Proceedings of the Second ACM Conference on Computer and Communications Security, Nov. 94, p. 170.
-
(1994)
Proceedings of the Second ACM Conference on Computer and Communications Security
, pp. 170
-
-
Lai, C.1
Medvinsky, G.2
Neuman, B.C.3
-
65
-
-
53349155287
-
-
student group project for class 15.967: Electronic commerce and marketing, Sloan School of Management, Massachusetts Institute of Technology
-
S. Bendiek, K. Laws, and C. Woehler, 1996. "Brokers and intermediaries," a student group project for class 15.967: Electronic commerce and marketing, Sloan School of Management, Massachusetts Institute of Technology, at http://www-sloan.mit.edu/15.967/GROUP23/qroup%20project%232.html
-
(1996)
Brokers and Intermediaries
-
-
Bendiek, S.1
Laws, K.2
Woehler, C.3
-
66
-
-
53349111336
-
-
organized by the Institute of Mathematics and Its Applications and held at the University of Edinburgh in August 1989, L. C. Thomas, ed. Oxford: Clarendon Press
-
Credit scoring and credit control : based on the proceedings of a conference on credit scoring and credit control, organized by the Institute of Mathematics and Its Applications and held at the University of Edinburgh in August 1989, L. C. Thomas, ed. Oxford: Clarendon Press, 1992, p. v.
-
(1992)
Credit Scoring and Credit Control: Based on the Proceedings of a Conference on Credit Scoring and Credit Control
-
-
-
69
-
-
0003424867
-
Credit markets with asymmetric information
-
B. Beckmann and W. Krelle, eds. Berlin: Springer-Verlag
-
and, G. Clemenz, 1986. "Credit markets with asymmetric information," In: B. Beckmann and W. Krelle, eds. Lecture Notes in Economics and Mathematical Systems, Berlin: Springer-Verlag.
-
(1986)
Lecture Notes in Economics and Mathematical Systems
-
-
Clemenz, G.1
-
71
-
-
0000735601
-
Money as a medium of exchange in an economy with artificially intelligent agents
-
E.
-
R. Marimon, E. McGrattan, E., and T. J. Sargent, 1990. "Money as a medium of exchange in an economy with artificially intelligent agents," Journal of Economic Dynamics and Control, vol. 14, pp. 329-373.
-
(1990)
Journal of Economic Dynamics and Control
, vol.14
, pp. 329-373
-
-
Marimon, R.1
McGrattan, E.2
Sargent, T.J.3
-
74
-
-
53349126447
-
-
ecash@digicash.com: Tuesday, 19 Dec 1995 In this paper, Patiwat Panurach (e-mail: pati@ipied.tu.ac.th), of the Faculty of Economics at Thammasat University in Bangkok
-
For instance, see P. Panurach, 1995. "The Economics of digital commerce: An Analysis of digital cash, electronic fund transfers, and ecash," ecash@digicash.com: Tuesday, 19 Dec 1995 12:42:23 +0700. In this paper, Patiwat Panurach (e-mail: pati@ipied.tu.ac.th), of the Faculty of Economics at Thammasat University in Bangkok, describes the characteristics of various digital instruments with respect to anonymity, liquidity, velocity, and money-supply.
-
(1995)
The Economics of Digital Commerce: An Analysis of Digital Cash, Electronic Fund Transfers, and Ecash
, vol.12
, Issue.42
-
-
Panurach, P.1
-
75
-
-
33751552615
-
On Money
-
P. Huber, 1992. "On Money," Forbes, vol. 16, p. 144.
-
(1992)
Forbes
, vol.16
, pp. 144
-
-
Huber, P.1
-
76
-
-
33751552615
-
On Money
-
P. Huber, "On Money," 1992. Forbes, vol. 16, p. 144. Op. cit.
-
(1992)
Forbes
, vol.16
, pp. 144
-
-
Huber, P.1
-
77
-
-
33751512658
-
SEC says brewery may use Internet to offer its stock
-
March 26
-
Originally it was actually processing trades and transactions itself but the SEC warned that it was not a licensed broker and the transactions should be carried out through a legitimate bank or escrow agent. See J. Taylor, 1996. "SEC says brewery may use Internet to offer its stock," Wall Street Journal (March 26), p. B4.
-
(1996)
Wall Street Journal
-
-
Taylor, J.1
-
78
-
-
53349131471
-
-
SEC-LIVE can be found at http://www.seclive.com/
-
-
-
-
79
-
-
53349149761
-
-
http://www.ai.mit.edu/people/lethin/ecm.html
-
-
-
-
80
-
-
33751552131
-
-
Cambridge Trading Services Corp., "Letters of credit," http://www.cambtrade.com/Letters.html
-
Letters of Credit
-
-
-
81
-
-
53349149763
-
-
Article 5 of the Uniform Commercial Code deals with letters of credit and can be found at http://www.law.cornell.edu/ucc/5/overview.html
-
-
-
-
82
-
-
53349159049
-
-
cypherpunks@toad.com: Tuesday, 19 Nov 1995
-
R. Hettinga, 1995. "e$: What's a digital bearer bond?," cypherpunks@toad.com: Tuesday, 19 Nov 1995 17:43:15; http://thumper.vmenq.com/ pub/rah/dbb.html
-
(1995)
E$: What's a Digital Bearer Bond?
, vol.17
, Issue.43
, pp. 15
-
-
Hettinga, R.1
-
83
-
-
33751532671
-
-
Dimitri Vulis opined that "The fact that bearer bonds were outlawed suggests that if and when new ways are invented to conduct financial transactions that are conductive to tax evasion (e.g., using anonymous electronic payments), they too may become outlawed." See D. Vulis, 1995. "RE: Anonymity and intellectual capital," http://infinity.nus.sq/ cypherpunks/dir.archive-95.11.15-95.11.21/0267.html
-
(1995)
RE: Anonymity and Intellectual Capital
-
-
Vulis, D.1
-
84
-
-
53349159049
-
-
cypherpunks@toad.com: Tuesday, 19 Nov 1995
-
R. Hettinga, 1995. "e$: What's a digital bearer bond?," cypherpunks@toad.com: Tuesday, 19 Nov 1995 17:43:15; http://thumper.vmenq.com/ pub/rah/dbb.html
-
(1995)
E$: What's a Digital Bearer Bond?
, vol.17
, Issue.43
, pp. 15
-
-
Hettinga, R.1
-
85
-
-
53349122936
-
-
note
-
Some mechanisms that are not being used or have been incorporated into other proposals include iKP, Secure Transaction Technology, Secure Electronic Payment Protocol, Netscape's Secure Courier, the Simple Network Payment Protocol, the Hewlett Packard Payment Method, and Anonymous Internet Mercantile Protocol.
-
-
-
-
86
-
-
53349093758
-
-
This information was formerly part of the Frequently Asked Questions file for the Security First Network Bank. This site has been reorganized and this information has been dispersed. Visit the Bank's site at http://www.sfnb.com/ infodesk/infodesk.html for more information.
-
-
-
-
87
-
-
0004198635
-
-
Englewood Cliffs, N. J.: Prentice-Hall
-
C. P. Pfleeger, 1989. Security in computing. Englewood Cliffs, N. J.: Prentice-Hall, p. 132.
-
(1989)
Security in Computing
, pp. 132
-
-
Pfleeger, C.P.1
-
89
-
-
0346870109
-
How to say "no"
-
J.-J. Quisquater and J. Vandewalle, eds. Advances in Cryptology - EUROCRYPT '89
-
A. Beutelspacher, 1990. "How to say "no"," In: J.-J. Quisquater and J. Vandewalle, eds. Advances in Cryptology - EUROCRYPT '89, Lecture Notes in Computer Science vol. 434, p. 491.
-
(1990)
Lecture Notes in Computer Science
, vol.434
, pp. 491
-
-
Beutelspacher, A.1
-
90
-
-
84957613612
-
Ripping coins for a fair exchange
-
L. C. Guillou and J.-J. Quisquater, eds. Advances in Cryptology - EUROCRYPT '95
-
M. Jakobsson, 1995. "Ripping coins for a fair exchange," In: L. C. Guillou and J.-J. Quisquater, eds. Advances in Cryptology - EUROCRYPT '95, Lecture Notes in Computer Science, vol. 921, p. 220.
-
(1995)
Lecture Notes in Computer Science
, vol.921
, pp. 220
-
-
Jakobsson, M.1
-
91
-
-
0011716149
-
Trust in a cryptographic economy and digital security deposits: Protocols and policies
-
Massachusetts Institute of Technology
-
Joseph M. Reagle Jr., 1996. "Trust in a cryptographic economy and digital security deposits: Protocols and policies," Master of Science in Technology and Policy Thesis, Massachusetts Institute of Technology, http://rpcp.mit.edu/∼reagle/commerce/commerce.html
-
(1996)
Master of Science in Technology and Policy Thesis
-
-
Reagle Jr., J.M.1
-
92
-
-
8344289547
-
Technical change in the televisionindust ry: Between "path- dependence" and new flexibilities
-
The concept of precedent dependency is related to "path- dependence" as discussed by P. Kavassalis, 1995. "Technical change in the televisionindust ry: Between "path-dependence" and new flexibilities," Communications & Strategies, vol. 17, p. 77.
-
(1995)
Communications & Strategies
, vol.17
, pp. 77
-
-
Kavassalis, P.1
-
94
-
-
53349170037
-
-
See http://www.cpsr.org/dox/wiretap.html
-
-
-
-
95
-
-
53349122935
-
-
note
-
These wiretaps would be very convenient. Law enforcement agency could request that all pertinent calls be routed to their own facilities for monitoring.
-
-
-
-
96
-
-
33751532670
-
The Internet as a source of regulatory arbitrage
-
Forthcoming, Cambridge, Mass.: MIT Press
-
A. M. Froomkin, 1996. "The Internet as a source of regulatory arbitrage," In: Information, national policies, and international infrastructure. Forthcoming, Cambridge, Mass.: MIT Press, p. 331.
-
(1996)
Information, National Policies, and International Infrastructure
, pp. 331
-
-
Froomkin, A.M.1
-
97
-
-
53349155298
-
-
note
-
The significant civil issue is to whom are the default rules useful for? Democratic societies generally strive to make legislation fair and useful to all.
-
-
-
-
98
-
-
0002227725
-
Anarchy, state, and the Internet: An Essay on law-making in cyberspace
-
article 3
-
D. Post, 1995. "Anarchy, state, and the Internet: An Essay on law-making in cyberspace," 1995 Journal of Online Law, article 3, at http://fatty.law.cornell.edu/jol/jol.table.html
-
(1995)
1995 Journal of Online Law
-
-
Post, D.1
-
99
-
-
53349132600
-
-
Bert-Jaap Koops' extensive Crypto-Law Survey
-
See Bert-Jaap Koops' extensive Crypto-Law Survey at http://cwis.kub.nl/ ∼frw/people/koops/lawsurvy.htm
-
-
-
-
100
-
-
33751549880
-
-
archive
-
Information on all of these points can be found in the Electronic Frontier Foundation "Privacy, Security, Crypto, Surveillance" archive at http://www.eff.org/pub/Privacy/
-
Privacy, Security, Crypto, Surveillance
-
-
-
101
-
-
53349126449
-
-
"In 1984, the President had issued a National Security Decision Directive, NSDD-145, which gave the intelligence agencies broad authority to peruse computer databases, for so-called 'sensitive but unclassified information.' A subsequent memorandum from John Poindexter, expanded this authority still further to include 'all computer and communications security for the Federal Government and private industry.' As the government's authority to control access to computerized information for the purpose of protecting national security expanded, the free of flow of information diminished. Stories of agents visiting private information vendors and public libraries soon followed. At the same time, a wide range of other activities by the government further threatened to restrict access to information." Marc Rotenberg's prepared testimony on The Computer Security Act Of 1987 (P. L. 100-235) and The Memorandum Of Understanding Between The National Institute Of Standards Technology (NIST) And The National Security Agency (NSA) Before The Subcommittee on Legislation and National Security, Committee on Government Operations U. S. House of Representatives. May 4, 1989. See http://www.epic.org/crypto/csa/ rotenberg_testimony.txt
-
-
-
-
104
-
-
53349131472
-
-
Legislation and reports on digital signature may be found at http://web.aimnet.com/∼software/industry_issues/1digsig.htm
-
-
-
-
105
-
-
53349086525
-
-
See the Utah Digital Signature Legislation Base at http://www.gvnfo. state.ut.us/ccjj/digsig/
-
-
-
-
107
-
-
53349115049
-
-
The guideline is no longer freely available to the public. Information on the guidelines can be found at: http://www.intermarket.com/ecl/
-
-
-
-
110
-
-
33751552735
-
Electronic cash and monetary policy
-
M. Bernkopf, 1996. "Electronic cash and monetary policy," First Monday, vol. 1, no. 1, http://www.firstmonday.org/?journal=fm&page= article&op=view&path[]=465;
-
(1996)
First Monday
, vol.1
, Issue.1
-
-
Bernkopf, M.1
-
112
-
-
33751532670
-
The Internet as a source of regulatory arbitrage
-
Forthcoming, Cambridge, Mass.: MIT Press
-
A. M. Froomkin, 1996. "The Internet as a source of regulatory arbitrage," In: Information, national policies, and international infrastructure. Forthcoming, Cambridge, Mass.: MIT Press;
-
(1996)
Information, National Policies, and International Infrastructure
-
-
Froomkin, A.M.1
-
114
-
-
33645775074
-
Law and borders: The Rise of law in cyberspace
-
D. R. Johnson and D. Post, 1996. "Law and borders: The Rise of law in cyberspace," First Monday, vol. 1, no. 1, http://www.firstmonday.org/? journal=fm&ipaqe=article&op=view&path[]=468;
-
(1996)
First Monday
, vol.1
, Issue.1
-
-
Johnson, D.R.1
Post, D.2
-
115
-
-
0002227725
-
Anarchy, state, and the Internet: An Essay on law-making in cyberspace
-
article 3
-
D. Post, 1995. "Anarchy, state, and the Internet: An Essay on law-making in cyberspace," 1995 Journal of Online Law, article 3, http://fatty.law.cornell.edu/jol/jol.table.html;
-
(1995)
1995 Journal of Online Law
-
-
Post, D.1
-
117
-
-
53349126447
-
-
ecash@digicash.com: Tuesday, 19 Dec 1995
-
P. Panurach, 1995. "The Economics of digital commerce: An Analysis of digital cash, electronic fund transfers, and ecash," ecash@digicash.com: Tuesday, 19 Dec 1995 12:42:23 +0700;
-
(1995)
The Economics of Digital Commerce: An Analysis of Digital Cash, Electronic Fund Transfers, and Ecash
, vol.12
, Issue.42
-
-
Panurach, P.1
-
118
-
-
33751537438
-
Government, cryptography, and the right to privacy
-
and J. Shearer and P. Gutmann, 1996. "Government, cryptography, and the right to privacy," Journal of Universal Computer Science, http://hyperg.iicm.tu-graz.ac.at/ qovernment_cryptography_and_the_right_to_privacy_htf;sk=2F074060
-
(1996)
Journal of Universal Computer Science
-
-
Shearer, J.1
Gutmann, P.2
-
119
-
-
53349088579
-
Pressure on Austrian bank laws
-
London, (April 12)
-
Reuters (Vienna), 1996. "Pressure on Austrian bank laws," Financial Times (London), (April 12).
-
(1996)
Financial Times
-
-
-
120
-
-
53349140329
-
-
note
-
Quoting from an electronic mail message addressed to the author, "We can execute your financial transactions, move cash from bank to bank, from brokerage accounts to bank, attorney, escrow account, etc. You instruct us by PGP as to what you need accomplished."
-
-
-
-
121
-
-
53349170036
-
IRS, FBI eye Internet with suspicion
-
(January), summary can be found on Edupage for 9 January 1996
-
Investor's Business Daily (1996), "IRS, FBI eye Internet with suspicion," vol. 9 (January), p. B1; summary can be found on Edupage for 9 January 1996 at http://educom.edu/edupage.old/edupage.96/edupage-01.10.96
-
(1996)
Investor's Business Daily
, vol.9
-
-
|