<--- Back to Details
First PageDocument Content
Security / Prevention / Government / Mass surveillance / Crime prevention / Law enforcement / National security / Phillip Rogaway / Surveillance / Bullrun / William Binney / Edward Snowden
Date: 2013-09-13 11:08:48
Security
Prevention
Government
Mass surveillance
Crime prevention
Law enforcement
National security
Phillip Rogaway
Surveillance
Bullrun
William Binney
Edward Snowden

Statement of Condemnation of U.S. Mass-Surveillance Programs, and a Reminder of Our Ethical Responsibilities as Computer Scientists We have all been hearing about the NSA’s mass-surveillance programs, which go by names

Add to Reading List

Source URL: web.cs.ucdavis.edu

Download Document from Source Website

File Size: 329,01 KB

Share Document on Facebook

Similar Documents

The Moral Character of Cryptographic Work? Phillip Rogaway Department of Computer Science University of California, Davis, USA  December 2015

The Moral Character of Cryptographic Work? Phillip Rogaway Department of Computer Science University of California, Davis, USA December 2015

DocID: 1tlwS - View Document

The Moral Character of Cryptographic Work Phillip Rogaway IACR Distinguished Lecture Asiacrypt 2015

The Moral Character of Cryptographic Work Phillip Rogaway IACR Distinguished Lecture Asiacrypt 2015

DocID: 1sMcB - View Document

Nonce-Based Symmetric Encryption Phillip Rogaway Dept. of Computer Science, University of California, Davis, CA 95616, USA, and Dept. of Computer Science, Fac. of Science, Chiang Mai University, Chiang Mai, Thailand 5020

Nonce-Based Symmetric Encryption Phillip Rogaway Dept. of Computer Science, University of California, Davis, CA 95616, USA, and Dept. of Computer Science, Fac. of Science, Chiang Mai University, Chiang Mai, Thailand 5020

DocID: 1suiQ - View Document

Evaluation of Some Blockcipher Modes of Operation Phillip Rogaway University of California, Davis Dept. of Computer Science Davis, California, USA

Evaluation of Some Blockcipher Modes of Operation Phillip Rogaway University of California, Davis Dept. of Computer Science Davis, California, USA

DocID: 1sbYw - View Document

The proceedings version of this paper appears asThis is the full version.  Authenticated-Encryption with Associated-Data Phillip Rogaway∗ 20 September 2002

The proceedings version of this paper appears asThis is the full version. Authenticated-Encryption with Associated-Data Phillip Rogaway∗ 20 September 2002

DocID: 1sbK7 - View Document