|
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910778656903321 |
|
|
Titolo |
Cryptography's role in securing the information society [[electronic resource] /] / Kenneth W. Dam and Herbert S. Lin, editors |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Washington, DC, : National Academy Press, 1996 |
|
|
|
|
|
|
|
ISBN |
|
0-309-17580-1 |
1-280-19228-3 |
9786610192281 |
0-309-52254-4 |
0-585-02525-8 |
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (720 p.) |
|
|
|
|
|
|
Altri autori (Persone) |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Telecommunication systems - Security measures - Government policy - United States |
Cryptography |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
"Committee to Study National Cryptography Policy, Computer Science and Telecommunications Board, Commission on Physical Sciences, Mathematics, and Applications, National Research Council." |
|
|
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
""Front Matter""; ""Preface""; ""Contents""; ""Executive Summary""; ""PART I Framing the Policy Issues""; ""1 Growing Vulnerability in the Information Age""; ""2 Cryptography: Roles, Market, and Infrastructure""; ""3 Needs for Access to Encrypted Information""; ""4 Export Controls""; ""5 Escrowed Encryption and Related Issues""; ""6 Other Dimensions of National Cryptography Policy""; ""PART III Policy Options, Findings, and Recommendations""; ""7 Policy Options for the Future""; ""8 Synthesis, Findings, and Recommendations"" |
""A Contributors to the NRC Project on National Cryptography Policy""""B Glossary""; ""C A Brief Primer on Cryptography""; ""D An Overview of Electronic Surveillance: History and Current Status""; ""E A Brief History of Cryptography Policy""; ""F A Brief Primer on Intelligence""; ""G The International Scope of Cryptography Policy""; ""H Summary of Important Requirements for a Public-Key Infrastructure""; ""I Industry-Specific |
|
|
|
|
|
|
|
|
|
|
Dimensions of Security""; ""J Examples of Risks Posed by Unprotected Information""; ""K Cryptographic Applications Programming Interfaces"" |
""L Other Looming Issues Related to Cryptography Policy""""M Federal Information Processing Standards""; ""N Laws, Documents, and Regulations, Relevant to Cryptography""; ""Index"" |
|
|
|
|
|
| |