Export of cryptography in the United States

Results: 94



#Item
1NEGOTIATING THE MINE FIELD The Conduct of Academic Research in Compliance with Export Controls

NEGOTIATING THE MINE FIELD The Conduct of Academic Research in Compliance with Export Controls

Add to Reading List

Source URL: www.higheredcompliance.org

Language: English - Date: 2014-01-23 03:15:22
2Remarks of Kevin Wolf, Assistant Secretary of Commerce for Export Administration Exportkontrolltag 2011 Veranstaltet vom Bundesamt für Wirtschaft und Ausfuhrkontrolle und dem

Remarks of Kevin Wolf, Assistant Secretary of Commerce for Export Administration Exportkontrolltag 2011 Veranstaltet vom Bundesamt für Wirtschaft und Ausfuhrkontrolle und dem

Add to Reading List

Source URL: www.zar-muenster.de

Language: English - Date: 2011-03-05 05:21:20
3SIMO-PEKKA PARVIAINEN CRYPTOGRAPHIC SOFTWARE EXPORT CONTROLS IN THE EU

SIMO-PEKKA PARVIAINEN CRYPTOGRAPHIC SOFTWARE EXPORT CONTROLS IN THE EU

Add to Reading List

Source URL: ethesis.helsinki.fi

Language: English - Date: 2013-01-14 08:29:17
4Harvard Journal o f Law & Technology  Volume 10, Number 3 Summer 1997 C R Y P T O G R A P H Y , E X P O R T C O N T R O L S , AND T H E F I R S T A M E N D M E N T IN B E R N S T E I N V. UNITED S T A T E S

Harvard Journal o f Law & Technology Volume 10, Number 3 Summer 1997 C R Y P T O G R A P H Y , E X P O R T C O N T R O L S , AND T H E F I R S T A M E N D M E N T IN B E R N S T E I N V. UNITED S T A T E S

Add to Reading List

Source URL: jolt.law.harvard.edu

Language: English - Date: 2011-02-11 21:38:44
5Transcript of a US Presentation given at a US/UK Government Meeting on Encryption Policy held in London in late 1996 or earlyInitial Presentation (UK) We welcome opportunity for consultation on the subject of encr

Transcript of a US Presentation given at a US/UK Government Meeting on Encryption Policy held in London in late 1996 or earlyInitial Presentation (UK) We welcome opportunity for consultation on the subject of encr

Add to Reading List

Source URL: www.cyber-rights.org

Language: English - Date: 1999-07-06 14:11:43
6Microsoft Word - Export Control.doc

Microsoft Word - Export Control.doc

Add to Reading List

Source URL: www.dartmouth.edu

Language: English - Date: 2014-07-16 12:57:14
7International trade / International Traffic in Arms Regulations / United States law / Business / Technology / Export / Law / Export Control Classification Number / Export of cryptography in the United States / Identifiers / Military technology / United States Department of Commerce

To: Export Controls Officer From: [Insert Name of VCU PI or Employee] Date: [Insert Date] Re: TMP Exception for Professional Temporary Exports

Add to Reading List

Source URL: www.research.vcu.edu

Language: English - Date: 2013-11-14 16:20:07
8Encryption from a Human Rights Perspective The right to privacy as stated in Art. 12 UDHR not only protects against arbitrary interference with correspondence but also entitles to protection by law against such interfere

Encryption from a Human Rights Perspective The right to privacy as stated in Art. 12 UDHR not only protects against arbitrary interference with correspondence but also entitles to protection by law against such interfere

Add to Reading List

Source URL: www.ohchr.org

Language: English - Date: 2015-03-16 11:04:20
9Cryptography is Important to the Public Interest This is a joint letter to the UN Special Rapporteur on Freedom of Expression from the undersigned non-governmental organizations in response to his January 2015 request fo

Cryptography is Important to the Public Interest This is a joint letter to the UN Special Rapporteur on Freedom of Expression from the undersigned non-governmental organizations in response to his January 2015 request fo

Add to Reading List

Source URL: www.ohchr.org

Language: English - Date: 2015-03-16 11:04:21
10Computer security / Password / Key size / FIPS 140-2 / Export of cryptography in the United States / Cryptography / Security / Key management

____________________________________________________________________ DUAL-USE LIST - CATEGORY 5 – PART 2 – "INFORMATION SECURITY" ____________________________________________________________________ _______________

Add to Reading List

Source URL: www.wassenaar.org

Language: English - Date: 2015-03-25 12:20:54