Back to Results
First PageMeta Content
Data security / Internet privacy / Key escrow / Key / Information security / Secure communication / Clipper chip / Man-in-the-middle attack / Disk encryption / Cryptography / Key management / Public-key cryptography


The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption Hal Abelson1 Ross Anderson2 Steven M. Bellovin3 Josh Benaloh4
Add to Reading List

Document Date: 2014-03-02 23:18:30


Open Document

File Size: 262,38 KB

Share Result on Facebook

City

Menlo Park / /

Company

MIT Laboratory / Hewlett-Packard / Sun Microsystems / MIT Information Systems / SRI International / Counterpane Systems / AT&T Laboratories / Microsoft / /

Country

United States / /

Facility

University of Cambridge / /

IndustryTerm

basic communication infrastructure / recovery encryption systems / electronic communications products / government law enforcement requirements / stored data applications / law enforcement demands / similar law enforcement demands / Internet link / electronic commerce schemes / telephone network / law enforcement speci cations / recovery infrastructure / mechanisms guaranteeing law enforcement access / communications sessions / similar systems / recovery systems / certain stored data systems / encrypted communications / encryption device / recoverability systems / business communications / government-driven key recovery systems / secure and trusted infrastructure / telephone conversations / information technology / infrastructure systems / encryption systems / law enforcement / functional key recovery infrastructure / recovery services / large-scale key recovery systems / certi cation infrastructure / electronic commerce / insecure networks / /

Organization

National Research Council / Information Society / U.S. Department of Commerce / MIT / U.S. government / Center for Democracy and Technology / U.K. Department / University of Cambridge / Trusted Third Party / /

Person

Ken Bass / Shabbir Safdar / David Sobel / Michael Froomkin / Daniel Weitzner / Alan Davidson / /

Position

Executive / Forward / Contents Executive / /

Product

Cambridge / /

ProgrammingLanguage

PostScript / /

ProvinceOrState

California / /

Technology

1.1 Encryption / key-recovery encryption / information technology / secret key / Properly implemented encryption / Encryption / cryptography / ASCII / government-driven key recovery encryption / basic encryption / /

SocialTag