Bibliography
Home | About the Author | Contact 
 
 
Home
Documents
Thesis
Bibliography
Links
 
 

Aaron, D. (1997). International Views of Key Recovery, Statement presented at the RSA Data Security Conference, San Francisco (CA), 28/01/97.

Abelson, H., Anderson, R., Bellovin, S.M., Benaloh, J., Blaze, M., Diffie, W., Gilmore, J., Neuman, P.G., Rivest, R.L., Schiller, J.I. & Schneir, B. (1998). The Risks of Key Recovery, Key Escrow & Trusted Third-Party Encryption. Washington (DC) : Center for Democracy and Technology.

Andrews, S. (2000). Who Holds the Key ? A Comparative Study of US and European Encryption Policies, The Journal of Information, Law and Technology, 2000, 2.

Aoki, K. (2000). Privacy and Encryption Export Controls : A Crypto Trilogy (Bernstein, Junger & Karn). Teaching module developed for the University of Oregon School of Law.

Barth, R.C. & Smith, C.N. (1997). International Regulation of Encryption : Technology Will Drive Policy. In Kahn, B.. & Nesson, C. (Editors), Borders in Cyberspace, Cambridge (MA), Massachusetts Institute of Technology Press.

Blaze, M. (1996). Cryptography Policy and the Information Economy, AT&T Labs Research, 27/12/96.

Borzo, J. (1999). Privacy group objects to new US crypto regulations, IDG News Service, 02/01/1999.

Brown, D. (2001). Crypto Debate Likely to be Revived, Interactive Week, 17/09/01.

Clark, P.C. (2001). Elusive Security, The Net Economy, 20/09/01.

Clark, T. & Wylie, M. (1997). Clinton Sets Course for Internet, CNET News, 01/07/1997.

Clausing, J. (1998). Administration Announces New Concessions on Encryption Policy, New York Times, 16/09/98.

Dam, K.W. & Lin H.S., Editors (1996). Cryptography's Role in Securing the Information Society. Washington (DC) : National Academy Press.

Denning, D.E. (1995). The Case for "Clipper", Technology Review, 07/95, 48-56.

Denning, D.E. (1996). Description of Key Escrow Systems, Communications of the ACM, 03/96.

Denning, D.E. (1996). Key Escrow Encryption Available, Gathe Lambit News Brief, 3, 1, 1st Quarter 1996.

Denning, D.E. (1996). Encrypting the Global Information Infrastructure, Computer Fraud and Security, 06/96.

Denning, D.E. (1997). Export Control, Encryption Software and Speech, Statement at RSA Data Security Conference, 28/01/97.

Denning, D.E. & Baugh W.E. (1996). Decoding Encryption Policy, Security Management, 02/01/96.

Diffie, W. & Landau, S. (1998). Privacy on the Line : The Politics of Wiretapping and Encryption. Cambridge (MA) : Massachusetts Institute of Technology.

Fischer, D. (2001). Escrow : Bad for E-Biz, eWeek, 01/10/01.

Froomkin, D. & Branson, A. (1998). Encryption Special Report. Washington (DC) : WashingtonPost.com, May 1998.

Froomkin, M. (1995). The Metaphor is the Key : Cryptography, the Clipper Chip, and the Constitution. Research sponsored by the University of Miami School of Law, 1995.

Froomkin, M. (1996). It Came from Planet Clipper : The Battle Over Cryptographic Key "Escrow", 1996 University of Chicago Legal Forum, 15.

Goodin, D. (1997). White House Shuns FBI Crypto Plan, CNET News, 05/09/97.

Goodin, D. (1997). Overhaul of SAFE Bill Approved, CNET News, 09/09/97.

Goodin, D. (1997). Cooks in Clinto Crypto Chicken, CNET News, 11/09/97.

Goodin, D. (1997). Crypto Bill SAFE Out of Committee, CNET News, 24/09/97.

Hoffman, L.J. (1995). Building in Big Brother : The Cryptographic Policy Debate. XX : Springer Verlag.

Hoffman, L.J., Ali, F.A., Heckler, S.L. & Huybrechts, A. (1994). Cryptography Policy, Communication of the ACM, 37, 9, 109-117.

Koops, B.J. (2001). Crypto Law Survey. Online resource available on the author's homepage at http://cwis.kub.nl/~frw/people/koops/lawsurvy.htm .

Krebs, B. (2001). Techies Urge Senator to Drop Encryption Key Plan, Newsbytes, 27/09/2001.

Lash, A. (1997). Feds Respond to Crypto Criticism, CNET News, 21/05/97.

Lash, A. (1997). FBI Wants Domestic Crypto Key, CNET News, 10/06097.

Lash, A. (1997). Crypto Bill Seeks Domestic Rules, CNET News, 17/06/97.

Lash, A. (1997). New Crypto Bill Clears Committee, CNET News, 19/06/97.

Lash, A (1997). Pro-Code Bill All But Dead, CNET News, 19/06/97.

Lash, A. (1997). Lott Lambasts FBI Crypto Policy, CNET News, 24/10/97.

Lash, A. & Goodin, D. (1997). SAFE Crypto Bill Cracked Again, CNET News, 12/09/97.

Lemos, R. (2001). Encryption Gurus Praise Government, CNET News, 10/04/2001.

Levy, S. (1994). Cypher Wars : Pretty Good Privacy Get Pretty Legal, Wired, 02/11/94.

Levy, S. (2001). Crypto : How the Code Rebels Beat the Government, Saving Privacy in the Digital Age. New York : Viking Penguin.

Luzader, D. & Smetannikov, M. (2001). FBI To Discuss Packet Tapping, Interactive Week, 05/11/01.

Macavinta, C. (1997). Clause Could Rescue Crypto Bill, CNET News, 13/05/97.

Macavinta, C. (1997). House Committee OKs Crypto Bill, CNET News, 14/05/97.

Macavinta, C. (1997). FTC Backs Industry on Privacy, CNET News, 31/07/97.

MacMillan, R. (1999). Encryption Act Clears Telecom Subcommittee, Newsbytes, 16/06/1999.

Madsen, W. & Benisar, D. (2000). Cryptography and Liberty 2000 : An International Survey of Encryption Policy. Washington (DC) : Electronic Privacy Information Center.

McCullagh, D. (1999). Crypto Law : Little Guy Loses, Wired News, 16/09/99.

McCullagh, D. (1999). Decoding the Crypto Policy Change, Wired News, 17/10/99.

Messmer, E. (1998). RSA Data Security blasts government encryption policy, Network World Fusion, 16/01/1998.

Messmer, E. (1998). Government makes it a bit easier to export encryption for some companies, Network World Fusion, 21/10/98.

Miles, S. (1997). Bill Seeks Online Federal Form, CNET News, 12/11097.

Mills, E. (1998). US encryption policy costing billions of dollars in lost sales, report claims, IDG News Service, 06/04/98.

Munro, N. (1997). New Encryption Technologies on the Horizon : Companies scamper Towards Key Recovery Schemes, Info-Sec.com, 1997.

Olbeter, E.R. & Hamilton, C. (1998). Finding the Key : Reconciling National and Economic Security Interests in Cryptography Policy. Washington (DC) : Economic Strategy Institute.

O'Neil, M.J. & Dempsey, J.X. (1999). Critical Infrastructure Protection : Threats to Privacy and Other Civil Liberties and Concerns with Government Mandates on Industry, Depaul Business Law Journal, 12, 97.

Phillips, D.J. (1997). Cryptography, Secrets, and the Structuring of Trust. In Agre, P.E. & Rotenberg, M. (Editors), Technology and Privacy : The New Landscape, Cambridge (MA), MIT Press.

Radosevitch, L. (1997). TIS CEO Steven Walker explains the critical issues of security and encryption, Info World Electric 01/09/97.

Rodger, W. (2001). Crypto Headache, Interactive Week, 12/02/01.

Rotenberg, M. (1993). Encryption Technology and Policy, Testimony presented before the Subcommittee on Telecommunications and Finance, US House of Representatives, Washington (DC), 09/06/93.

Rotenberg, M., Sobel, D.L., Banisar, D. & Madsen, W. (1999). Cryptography and Liberty 1999 : An International Survey of Encryption Policy. Washington (DC) : Electronic Privacy Information Center.

Schneir, B. (1996). Applied Cryptography, Second Edition : Protocols, Algorithms and Source Code in C. New York : John Wiley & Sons, Inc.

Schneir, B. & Banisar, D. (1997). The Electronic Privacy Papers : Documents on the Battle for Privacy in the Age of Surveillance. New York : John Wiley & Sons, Inc.

Singleton, S. (1998). Encryption Policy for the 21st Century : A Future without Government-Prescribed Key Recovery, Policy Analysis 325, 19/11/98.

Strossen, N., Glasser, I., Clark, K.B. & Siegel, L. (1998). Big Brother in the Wires : Wiretapping in the Digital Age. New York : American Civil Liberties Union.

Tedeschi, B. (2001). Privacy vs Profits, New York Times, 01/10/01.

Weil, N. & Busse, T. (1998). 13 companies support encryption alternative, IDG News Service, 14/07/98.

Weissman, C. (1991). A National Debate on Encryption Exportability, Communication of the ACM, 34, 10, 162.

Wolfe, F. (1998). US Encryption Policy Far from "Home Run", Alliance Says, Phillips Publishing International, 28/10/1998.

 
Copyright © 2001-2002 Vincent Caldeira