Marie A. Wright

Learn More
I nformation linked to individual persons was once difficult to find and even more burdensome to cross-reference. Now, such information is readily accessible and collectible through the use of automated search facilities. The threat to personal privacy has never been greater. This article presents examples of how current technology is being used to(More)
In order for a distributed network to function securely, the integrity of the data transmitted over the communication links must be maintained. The use of either link encryption or end-to-end encryption will help to maintain the integrity of transmitted data, although there are differences in the level of security which they provide. This paper begins with(More)
  • 1