Back to Results
First PageMeta Content
Computer network security / Crime prevention / National security / Key management / Computer security / Key escrow / Clipper chip / Vulnerability / Encryption / Security / Cyberwarfare / Cryptography


governmentreform-blaze2015
Add to Reading List

Document Date: 2015-04-29 09:32:56


Open Document

File Size: 164,91 KB

Share Result on Facebook

City

Philadelphia / Athens / /

Company

FBI’s / AT&T Bell Laboratories / /

Country

United States / US / /

/

Event

Natural Disaster / Man-Made Disaster / /

Facility

MATT BLAZE UNIVERSITY OF PENNSYLVANIA1 US HOUSE OF REPRESENTATIVES COMMITTEE / University of Pennsylvania / University of Pennsylvania Computer / /

IndustryTerm

individual products / digital technology / few existing secure systems / communications content / pervasive computing / software economy / programmable computing / law enforcement service centers / software projects / lawful access systems / heterogeneous software / security favor systems / communications technologies / law enforcement access scheme / instant messaging services / law enforcement access cryptography / insecure technology / law enforcement requests / technology advances / encrypted communications systems / communications functions / communication technologies / software developers / correct software / software-based systems / software developer / law enforcement access features / larger and more complex systems / law enforcement access services.8 / software component / insecure media / software systems / software ecosystem / security technologies / hostile intelligence services / software defects / telephone switches / law enforcement access problem / digital systems / communications paradigms / law enforcement key recovery / encrypted communications / mobile phone carrier / software reliability / cryptographic systems / large-scale software / software applications / software / law enforcement access / end-user software / communications systems / software platforms / data management / telephone / law enforcement access function / software correctness / law enforcement interception / law enforcement access mechanism / an ideal solution / software vulnerabilities / improved law enforcement / simpler systems / encryption systems / software security problem / law enforcement / computing / Law enforcement access requirements / simplest encryption systems / software libraries / infrastructure-support software / software architecture / end-user devices / unintentional software bugs / larger systems / incorporating a law enforcement access mechanism / /

Organization

National Security Agency / the University of Pennsylvania / US HOUSE OF REPRESENTATIVES COMMITTEE ON GOVERNMENT OVERSIGHT AND REFORM INFORMATION TECHNOLOGY SUBCOMMITTEE ENCRYPTION TECHNOLOGY AND POSSIBLE US POLICY RESPONSES / Federal Bureau of Investigation / University of Pennsylvania Computer and Information Science / /

Person

Matt Blaze / /

/

Position

research scientist / software developer / professor in the computer science department / /

ProvinceOrState

Pennsylvania / /

PublishedMedium

IEEE Spectrum / /

Technology

peer-to-peer / communications technologies / cryptography system / insecure technology / instant messaging / MATT BLAZE UNIVERSITY OF PENNSYLVANIA1 US HOUSE OF REPRESENTATIVES COMMITTEE ON GOVERNMENT OVERSIGHT AND REFORM INFORMATION TECHNOLOGY SUBCOMMITTEE ENCRYPTION TECHNOLOGY / encryption / security technologies / cellular telephone / cryptography / communication technologies / trusted-third party encryption / Clipper Chip / encryption system / /

SocialTag