Export of cryptography

Results: 140



#Item
1

A Retrospective on the Use of Export Cryptography or, Top 10 Ways Bill Clinton Broke TLS! David Adrian

Add to Reading List

Source URL: davidadrian.org

- Date: 2016-08-05 23:56:59
    2Security / Cyberwarfare / Computing / Cryptography / Computer network security / Computer security / Crime prevention / National security / National Security Agency

    The Next Cyber Security Threat: Export Controls The debate around cybersecurity tools and terrorists has been raging between government entities (US and non-US) and the computer industry for the last couple of years. The

    Add to Reading List

    Source URL: nsclab.org

    Language: English - Date: 2016-06-20 22:48:36
    3Cryptography / Crime prevention / National security / Encryption / Computer security / Internet privacy / National Security Agency / End-to-end encryption / Surveillance / Crypto Wars / Export of cryptography from the United States

    PDF Document

    Add to Reading List

    Source URL: homeland.house.gov

    Language: English - Date: 2016-07-05 08:45:24
    4E-commerce / Key management / Public key certificate / Public key infrastructure / Public-key cryptography

    ph a r m e xcil PHARMACEUTICALS EXPORT PROMOTION COUNCIL OF INDIA (Setup by Ministr y of Commerce & Industr y, Govt. of India) 101, Aditya Trade Centre, Ameer pet, HyderabadTel. No, , Fa

    Add to Reading List

    Source URL: www.pharmexcil.com

    Language: English - Date: 2016-05-31 01:35:49
    5Cryptography / Cryptographic software / Key management / Strong cryptography / Pretty Good Privacy / Cypherpunk / Encryption / Key / Public-key cryptography / Export of cryptography from the United States / Phil Zimmermann / Data Encryption Standard

    Strong Cryptography The Global Tide of Change by Arnold G. Reinhold No. 51

    Add to Reading List

    Source URL: object.cato.org

    Language: English - Date: 2012-12-14 18:44:35
    6Government / Law / International relations / Crime prevention / National security / Military technology / Cryptography / Information governance / Dual-use technology / Wassenaar Arrangement / Privacy International / Information security

    Final Draft Overview of Recent Developments in the Export Controls of Surveillance Technologies in Europe There have been many developments in recent years in regards to the control of the exports of surveillance technol

    Add to Reading List

    Source URL: cihr.eu

    Language: English - Date: 2016-01-04 07:19:47
    7Computer security / Ubiquitous computing / Cryptography / Smart card / Philippines / International Traffic in Arms Regulations / Computer / Information security / Numerical control / Security / Technology / Political geography

    Example of control items / Industry Seminar in the Philippines (Jan. 13, Examples of control items Office of International Affairs for Security Export Control, Trade and Economic Cooperation Bureau,

    Add to Reading List

    Source URL: supportoffice.jp

    Language: English - Date: 2014-10-22 20:33:05
    8Business / International trade / International Traffic in Arms Regulations / Weapons / Technology / Export / Bureau of Industry and Security / Export Control Classification Number / Export of cryptography in the United States / Identifiers / Military technology / United States Department of Commerce

    NEGOTIATING THE MINE FIELD The Conduct of Academic Research in Compliance with Export Controls

    Add to Reading List

    Source URL: www.higheredcompliance.org

    Language: English - Date: 2014-01-23 03:15:22
    9Legal documents / Identifiers / International Traffic in Arms Regulations / Military technology / United States Department of Commerce / United States law / End-user / Export / Public key certificate / Cryptography / Law / Security

    U.S. Department of State UNITED STATES OF AMERICA NONTRANSFER AND USE CERTIFICATE 2. Name of United States applicant

    Add to Reading List

    Source URL: www.sinclairintl.com

    Language: English - Date: 2009-05-20 14:49:54
    10Computing / Computer security / Cryptographic software / Privacy of telecommunications / Email privacy / Email encryption / Encryption / Privacy / Pretty Good Privacy / Internet privacy / Email / Cryptography

    CHAPTER to put PGP on the Internet for use in the U.S., and in conformance with export controls. By the end of the decade, the

    Add to Reading List

    Source URL: inst.eecs.berkeley.edu

    Language: English - Date: 2012-03-17 16:37:44
    UPDATE