The risks of key recovery, key escrow, and trusted third-party encryption
A variety of "key recovery," "key escrow," and "trusted third-party" encryption requirements have been suggested in recent years by government agencies seeking to conduct covert surveillance within the changing environments brought about by new technologies. This report...
Main Authors: | , , , , , , , , , , |
---|---|
Other Authors: | |
Format: | Article |
Language: | en_US |
Published: |
O'Reilly & Associates, Inc
2018
|
Online Access: | http://hdl.handle.net/1721.1/117329 https://orcid.org/0000-0002-5328-7821 https://orcid.org/0000-0002-7105-3690 |