First Page | Meta Content | |
---|---|---|
Document Date: 2009-07-26 21:29:54Open Document File Size: 147,91 KBShare Result on FacebookCitySan Jose / /CompanyIBM / Information Security Elsevier B.V. / The Boeing / RSA Data Security / Hagelin Ag. / Susan Landau Sun Microsystems Inc / /ContinentAsia / Europe / /CountryNew Zealand / Japan / United States / Iceland / Australia / /CurrencyUSD / /FacilityNational Institute of Standards and Technology / Massachusetts Institute of Technology / /IndustryTermcryptographic software / cryptographic technology / even major systems / export-control machinery / exportable products / law regulating military exports / communication systems / machinery / nuclear energy / civilian applications / Intercept devices / open-source software / regulatory machinery / manufacturing capacity / good encryption algorithm / secure product / atomic energy / communications carriers / computer systems / cryptographic equipment / foreign products / cryptographic hardware / internet commerce / cryptographic devices / encryption equipment / communication protocols / law enforcement / wiretapping into their networks / encryption algorithm / privacy-protecting technologies / electronic commerce / ordinary commercial computing equipment / /OrganizationNational Security Agency / American Council on Education / MIT / U.S. Government / Coordinating Committee on Multilateral Export Controls / Department of Energy / United States Department of Commerce / Massachusetts Institute of Technology / Department of Justice / Education committee / National Institute of Standards and Technology / Department of State / Bureau of Export Administration / Congress / American Mathematical Society / Department of Commerce / Department of Commerce Bureau of Export Administration / Munition Control Board / /PersonRobert Morland / Clinton / Federal Register / Philip Zimmerman / Horst Feistel / /PositionPresident / General / banker / forward / programmer / /ProductBoeing 707 / KC-135 / RC-135 / C-135 / /ProvinceOrStateMassachusetts / /PublishedMediumPublic Law / Notices of the American Mathematical Society / the Progressive / /RegionWestern Europe / /Technologymilitary communication protocols / radiation / x-ray / encryption algorithm / privacy-protecting technologies / secret key / Encryption / Cryptography / 80-bit algorithm / OCR / 40 bits.8 Two algorithms / voice recognition / good encryption algorithm / digital signature / /SocialTag |