Aaron, D. (1997). International
Views of Key Recovery, Statement presented at the RSA Data Security
Conference, San Francisco (CA), 28/01/97.
Abelson, H., Anderson,
R., Bellovin, S.M., Benaloh, J., Blaze, M., Diffie, W., Gilmore,
J., Neuman, P.G., Rivest, R.L., Schiller, J.I. & Schneir, B.
(1998). The Risks of Key Recovery, Key Escrow & Trusted Third-Party
Encryption. Washington (DC) : Center for Democracy and Technology.
Andrews, S. (2000).
Who Holds the Key ? A Comparative Study of US and European Encryption
Policies, The Journal of Information, Law and Technology, 2000,
2.
Aoki, K. (2000). Privacy
and Encryption Export Controls : A Crypto Trilogy (Bernstein, Junger
& Karn). Teaching module developed for the University of Oregon
School of Law.
Barth, R.C. & Smith,
C.N. (1997). International Regulation of Encryption : Technology
Will Drive Policy. In Kahn, B.. & Nesson, C. (Editors), Borders
in Cyberspace, Cambridge (MA), Massachusetts Institute of Technology
Press.
Blaze, M. (1996). Cryptography
Policy and the Information Economy, AT&T Labs Research, 27/12/96.
Borzo, J. (1999). Privacy
group objects to new US crypto regulations, IDG News Service, 02/01/1999.
Brown, D. (2001). Crypto
Debate Likely to be Revived, Interactive Week, 17/09/01.
Clark, P.C. (2001).
Elusive Security, The Net Economy, 20/09/01.
Clark, T. & Wylie,
M. (1997). Clinton Sets Course for Internet, CNET News, 01/07/1997.
Clausing, J. (1998).
Administration Announces New Concessions on Encryption Policy, New
York Times, 16/09/98.
Dam, K.W. & Lin
H.S., Editors (1996). Cryptography's Role in Securing the Information
Society. Washington (DC) : National Academy Press.
Denning, D.E. (1995).
The Case for "Clipper", Technology Review, 07/95, 48-56.
Denning, D.E. (1996).
Description of Key Escrow Systems, Communications of the ACM, 03/96.
Denning, D.E. (1996).
Key Escrow Encryption Available, Gathe Lambit News Brief, 3, 1,
1st Quarter 1996.
Denning, D.E. (1996).
Encrypting the Global Information Infrastructure, Computer Fraud
and Security, 06/96.
Denning, D.E. (1997).
Export Control, Encryption Software and Speech, Statement at RSA
Data Security Conference, 28/01/97.
Denning, D.E. &
Baugh W.E. (1996). Decoding Encryption Policy, Security Management,
02/01/96.
Diffie, W. & Landau,
S. (1998). Privacy on the Line : The Politics of Wiretapping and
Encryption. Cambridge (MA) : Massachusetts Institute of Technology.
Fischer, D. (2001).
Escrow : Bad for E-Biz, eWeek, 01/10/01.
Froomkin, D. & Branson,
A. (1998). Encryption Special Report. Washington (DC) : WashingtonPost.com,
May 1998.
Froomkin, M. (1995).
The Metaphor is the Key : Cryptography, the Clipper Chip, and the
Constitution. Research sponsored by the University of Miami School
of Law, 1995.
Froomkin, M. (1996).
It Came from Planet Clipper : The Battle Over Cryptographic Key
"Escrow", 1996 University of Chicago Legal Forum, 15.
Goodin, D. (1997). White
House Shuns FBI Crypto Plan, CNET News, 05/09/97.
Goodin, D. (1997). Overhaul
of SAFE Bill Approved, CNET News, 09/09/97.
Goodin, D. (1997). Cooks
in Clinto Crypto Chicken, CNET News, 11/09/97.
Goodin, D. (1997). Crypto
Bill SAFE Out of Committee, CNET News, 24/09/97.
Hoffman, L.J. (1995).
Building in Big Brother : The Cryptographic Policy Debate. XX :
Springer Verlag.
Hoffman, L.J., Ali,
F.A., Heckler, S.L. & Huybrechts, A. (1994). Cryptography Policy,
Communication of the ACM, 37, 9, 109-117.
Koops, B.J. (2001).
Crypto Law Survey. Online resource available on the author's homepage
at http://cwis.kub.nl/~frw/people/koops/lawsurvy.htm .
Krebs, B. (2001). Techies
Urge Senator to Drop Encryption Key Plan, Newsbytes, 27/09/2001.
Lash, A. (1997). Feds
Respond to Crypto Criticism, CNET News, 21/05/97.
Lash, A. (1997). FBI
Wants Domestic Crypto Key, CNET News, 10/06097.
Lash, A. (1997). Crypto
Bill Seeks Domestic Rules, CNET News, 17/06/97.
Lash, A. (1997). New
Crypto Bill Clears Committee, CNET News, 19/06/97.
Lash, A (1997). Pro-Code
Bill All But Dead, CNET News, 19/06/97.
Lash, A. (1997). Lott
Lambasts FBI Crypto Policy, CNET News, 24/10/97.
Lash, A. & Goodin,
D. (1997). SAFE Crypto Bill Cracked Again, CNET News, 12/09/97.
Lemos, R. (2001). Encryption
Gurus Praise Government, CNET News, 10/04/2001.
Levy, S. (1994). Cypher
Wars : Pretty Good Privacy Get Pretty Legal, Wired, 02/11/94.
Levy, S. (2001). Crypto
: How the Code Rebels Beat the Government, Saving Privacy in the
Digital Age. New York : Viking Penguin.
Luzader, D. & Smetannikov,
M. (2001). FBI To Discuss Packet Tapping, Interactive Week, 05/11/01.
Macavinta, C. (1997).
Clause Could Rescue Crypto Bill, CNET News, 13/05/97.
Macavinta, C. (1997).
House Committee OKs Crypto Bill, CNET News, 14/05/97.
Macavinta, C. (1997).
FTC Backs Industry on Privacy, CNET News, 31/07/97.
MacMillan, R. (1999).
Encryption Act Clears Telecom Subcommittee, Newsbytes, 16/06/1999.
Madsen, W. & Benisar,
D. (2000). Cryptography and Liberty 2000 : An International Survey
of Encryption Policy. Washington (DC) : Electronic Privacy Information
Center.
McCullagh, D. (1999).
Crypto Law : Little Guy Loses, Wired News, 16/09/99.
McCullagh, D. (1999).
Decoding the Crypto Policy Change, Wired News, 17/10/99.
Messmer, E. (1998).
RSA Data Security blasts government encryption policy, Network World
Fusion, 16/01/1998.
Messmer, E. (1998).
Government makes it a bit easier to export encryption for some companies,
Network World Fusion, 21/10/98.
Miles, S. (1997). Bill
Seeks Online Federal Form, CNET News, 12/11097.
Mills, E. (1998). US
encryption policy costing billions of dollars in lost sales, report
claims, IDG News Service, 06/04/98.
Munro, N. (1997). New
Encryption Technologies on the Horizon : Companies scamper Towards
Key Recovery Schemes, Info-Sec.com, 1997.
Olbeter, E.R. &
Hamilton, C. (1998). Finding the Key : Reconciling National and
Economic Security Interests in Cryptography Policy. Washington (DC)
: Economic Strategy Institute.
O'Neil, M.J. & Dempsey,
J.X. (1999). Critical Infrastructure Protection : Threats to Privacy
and Other Civil Liberties and Concerns with Government Mandates
on Industry, Depaul Business Law Journal, 12, 97.
Phillips, D.J. (1997).
Cryptography, Secrets, and the Structuring of Trust. In Agre, P.E.
& Rotenberg, M. (Editors), Technology and Privacy : The New
Landscape, Cambridge (MA), MIT Press.
Radosevitch, L. (1997).
TIS CEO Steven Walker explains the critical issues of security and
encryption, Info World Electric 01/09/97.
Rodger, W. (2001). Crypto
Headache, Interactive Week, 12/02/01.
Rotenberg, M. (1993).
Encryption Technology and Policy, Testimony presented before the
Subcommittee on Telecommunications and Finance, US House of Representatives,
Washington (DC), 09/06/93.
Rotenberg, M., Sobel,
D.L., Banisar, D. & Madsen, W. (1999). Cryptography and Liberty
1999 : An International Survey of Encryption Policy. Washington
(DC) : Electronic Privacy Information Center.
Schneir, B. (1996).
Applied Cryptography, Second Edition : Protocols, Algorithms and
Source Code in C. New York : John Wiley & Sons, Inc.
Schneir, B. & Banisar,
D. (1997). The Electronic Privacy Papers : Documents on the Battle
for Privacy in the Age of Surveillance. New York : John Wiley &
Sons, Inc.
Singleton, S. (1998).
Encryption Policy for the 21st Century : A Future without Government-Prescribed
Key Recovery, Policy Analysis 325, 19/11/98.
Strossen, N., Glasser,
I., Clark, K.B. & Siegel, L. (1998). Big Brother in the Wires
: Wiretapping in the Digital Age. New York : American Civil Liberties
Union.
Tedeschi, B. (2001).
Privacy vs Profits, New York Times, 01/10/01.
Weil, N. & Busse,
T. (1998). 13 companies support encryption alternative, IDG News
Service, 14/07/98.
Weissman, C. (1991).
A National Debate on Encryption Exportability, Communication of
the ACM, 34, 10, 162.
Wolfe, F. (1998). US Encryption Policy
Far from "Home Run", Alliance Says, Phillips Publishing
International, 28/10/1998.
|