Export of cryptography in the United States

Results: 94



#Item
1Business / International trade / International Traffic in Arms Regulations / Weapons / Technology / Export / Bureau of Industry and Security / Export Control Classification Number / Export of cryptography in the United States / Identifiers / Military technology / United States Department of Commerce

NEGOTIATING THE MINE FIELD The Conduct of Academic Research in Compliance with Export Controls

Add to Reading List

Source URL: www.higheredcompliance.org

Language: English - Date: 2014-01-23 03:15:22
2Military science / International trade / Technology / International Traffic in Arms Regulations / Export Control Classification Number / United States Munitions List / Export / Dual-use technology / Export of cryptography in the United States / Military technology / Identifiers / United States Department of Commerce

Remarks of Kevin Wolf, Assistant Secretary of Commerce for Export Administration Exportkontrolltag 2011 Veranstaltet vom Bundesamt für Wirtschaft und Ausfuhrkontrolle und dem

Add to Reading List

Source URL: www.zar-muenster.de

Language: English - Date: 2011-03-05 05:21:20
3Military technology / International trade / Identifiers / United States Department of Commerce / International organizations / Cryptography / International Traffic in Arms Regulations / Wassenaar Arrangement / Export / Law / International relations / Security

SIMO-PEKKA PARVIAINEN CRYPTOGRAPHIC SOFTWARE EXPORT CONTROLS IN THE EU

Add to Reading List

Source URL: ethesis.helsinki.fi

Language: English - Date: 2013-01-14 08:29:17
4Electronic Frontier Foundation / Snuffle / Daniel J. Bernstein / International Traffic in Arms Regulations / Bernstein / Key size / National Security Agency / Junger v. Daley / Export of cryptography in the United States / Cryptography / Security / Bernstein v. United States

Harvard Journal o f Law & Technology Volume 10, Number 3 Summer 1997 C R Y P T O G R A P H Y , E X P O R T C O N T R O L S , AND T H E F I R S T A M E N D M E N T IN B E R N S T E I N V. UNITED S T A T E S

Add to Reading List

Source URL: jolt.law.harvard.edu

Language: English - Date: 2011-02-11 21:38:44
5Crime prevention / National security / Key escrow / Public-key cryptography / Computer security / Key / Export of cryptography in the United States / Disk encryption / Cryptography / Key management / Computer network security

Transcript of a US Presentation given at a US/UK Government Meeting on Encryption Policy held in London in late 1996 or earlyInitial Presentation (UK) We welcome opportunity for consultation on the subject of encr

Add to Reading List

Source URL: www.cyber-rights.org

Language: English - Date: 1999-07-06 14:11:43
6United States Department of Commerce / Business / International relations / International Traffic in Arms Regulations / Weapons / Export / Office of Foreign Assets Control / Bureau of Industry and Security / Export of cryptography in the United States / International trade / Identifiers / Military technology

Microsoft Word - Export Control.doc

Add to Reading List

Source URL: www.dartmouth.edu

Language: English - Date: 2014-07-16 12:57:14
7International trade / International Traffic in Arms Regulations / United States law / Business / Technology / Export / Law / Export Control Classification Number / Export of cryptography in the United States / Identifiers / Military technology / United States Department of Commerce

To: Export Controls Officer From: [Insert Name of VCU PI or Employee] Date: [Insert Date] Re: TMP Exception for Professional Temporary Exports

Add to Reading List

Source URL: www.research.vcu.edu

Language: English - Date: 2013-11-14 16:20:07
8Email / Public-key cryptography / Internet standards / Internet privacy / Encryption / Transport Layer Security / Export of cryptography in the United States / Pretty Good Privacy / Cryptography / Internet / Computing

Encryption from a Human Rights Perspective The right to privacy as stated in Art. 12 UDHR not only protects against arbitrary interference with correspondence but also entitles to protection by law against such interfere

Add to Reading List

Source URL: www.ohchr.org

Language: English - Date: 2015-03-16 11:04:20
9Cryptographic software / GNU Privacy Guard / Encryption / Export of cryptography in the United States / Index of cryptography articles / Cryptography / Security / Computer security

Cryptography is Important to the Public Interest This is a joint letter to the UN Special Rapporteur on Freedom of Expression from the undersigned non-governmental organizations in response to his January 2015 request fo

Add to Reading List

Source URL: www.ohchr.org

Language: English - Date: 2015-03-16 11:04:21
10Computer security / Password / Key size / FIPS 140-2 / Export of cryptography in the United States / Cryptography / Security / Key management

____________________________________________________________________ DUAL-USE LIST - CATEGORY 5 – PART 2 – "INFORMATION SECURITY" ____________________________________________________________________ _______________

Add to Reading List

Source URL: www.wassenaar.org

Language: English - Date: 2015-03-25 12:20:54
UPDATE