Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Schiller, Jeffrey I"'
Autor:
Abelson, Hal, Anderson, Ross, Bellovin, Steven M., Benaloh, Josh, Blaze, Matt, Callas, Jon, Diffie, Whitfield, Landau, Susan, Neumann, Peter G., Rivest, Ronald L., Schiller, Jeffrey I., Schneier, Bruce, Teague, Vanessa, Troncoso, Carmela
Publikováno v:
Journal of Cybersecurity, 10(1), 2024
Our increasing reliance on digital technology for personal, economic, and government affairs has made it essential to secure the communications and devices of private citizens, businesses, and governments. This has led to pervasive use of cryptograph
Externí odkaz:
http://arxiv.org/abs/2110.07450
Autor:
Schiller, Jeffrey I.
Publikováno v:
Scientific American, 1994 Nov 01. 271(5), 72-76.
Externí odkaz:
https://www.jstor.org/stable/24942908
Autor:
Abelson, Harold, Anderson, Ross, Bellovin, Steven M, Benaloh, Josh, Blaze, Matt, Callas, Jon, Diffie, Whitfield, Landau, Susan, Neumann, Peter G, Rivest, Ronald L, Schiller, Jeffrey I, Schneier, Bruce, Teague, Vanessa, Troncoso, Carmela
Publikováno v:
Journal of Cybersecurity; January 2024, Vol. 10 Issue: 1
Autor:
Abelson, Harold “Hal”, Anderson, Ross, Bellovin, Steven M., Benaloh, Josh, Blaze, Matt, Diffie, Whitfield “Whit”, Gilmore, John, Green, Matthew, Landau, Susan, Neumann, Peter G., Rivest, Ronald L., Schiller, Jeffrey I., Schneier, Bruce, Specter, Michael A., Weitzner, Daniel J.
Publikováno v:
Communications of the ACM; Oct2015, Vol. 58 Issue 10, p24-26, 3p, 1 Color Photograph
Autor:
Abelson, Hal, Anderson, Ross, Bellovin, Steven Michael, Benaloh, Josh, Blaze, Matt, Diffie, Whitfield, Gilmore, John, Neumann, Peter G., Rivest, Ronald L., Schiller, Jeffrey I., Schneier, Bruce
A variety of "key recovery," "key escrow," and "trusted third-party" encryption requirements have been suggested in recent years by government agencies seeking to conduct covert surveillance within the changing environments brought about by new techn
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::34cf5f4ea38eb1c2e740cf915c8273e4
Autor:
Garfinkel, Simson L., Margrave, David, Schiller, Jeffrey I., Nordlander, Erik, Miller, Robert C.
Publikováno v:
Proceedings of the SIGCHI Conference: Human Factors in Computing Systems (9781581139983); 4/ 2/2005, p701-710, 10p
Autor:
Patrick, Andrew, Yung, Moti, Garfinkel, Simson L., Schiller, Jeffrey I., Nordlander, Erik, Margrave, David, Miller, Robert C.
Publikováno v:
Financial Cryptography & Data Security; 2005, p188-202, 15p
Autor:
Schiller, Jeffrey I.
Publikováno v:
Cutter Benchmark Review; Dec2005, Vol. 5 Issue 12, p13-19, 7p, 1 Black and White Photograph
Autor:
Abelson, Harold, Anderson, Ross, Bellovin, Steven M., Benaloh, Josh, Blaze, Matt, Diffie, Whitfield, Gilmore, John, Green, Matthew, Landau, Susan, Neumann, Peter G., Rivest, Ronald L., Schiller, Jeffrey I., Schneier, Bruce, Specter, Michael A., Weitzner, Daniel J.
Publikováno v:
Journal of Cybersecurity; September 2015, Vol. 1 Issue: 1 p69-69, 1p
Autor:
Whitfield Diffie, Peter G. Neumann, Daniel J. Weitzner, Jeffrey I. Schiller, Bruce Schneier, Susan Landau, Matthew Green, Matt Blaze, Steven M. Bellovin, Ross Anderson, Harold Abelson, Josh Benaloh, Michael A. Specter, Ronald L. Rivest, John Gilmore
Publikováno v:
MIT web domain
Twenty years ago, law enforcement organizations lobbied to require data and communication services to engineer their products to guarantee law enforcement access to all data. After lengthy debate and vigorous predictions of enforcement channels “go