The risks of key recovery, key escrow, and trusted third-party encryption
A variety of "key recovery," "key escrow," and "trusted third-party" encryption requirements have been suggested in recent years by government agencies seeking to conduct covert surveillance within the changing environments brought about by new technologies. This report...
Main Authors: | , , , , , , , , , , |
---|---|
Other Authors: | , , , |
Format: | Article |
Language: | English |
Published: |
O'Reilly & Associates, Inc,
2018-08-09T19:01:36Z.
|
Subjects: | |
Online Access: | Get fulltext |