• Corpus ID: 31574381

Cryptography and Liberty: 'Can the Trusted Third Parties be Trusted ? A Critique of the Recent UK Proposals'

  title={Cryptography and Liberty: 'Can the Trusted Third Parties be Trusted ? A Critique of the Recent UK Proposals'},
  author={Yaman Akdeniz and Oliver Clarke and Alistair Kelman},
  journal={J. Inf. Law Technol.},
Computer encryption is part of the basic infrastructure for modern digital commerce and communications. Recently it has been the subject of various proposals from the U.K. government, as well as governments in several other countries and the European Union as a whole. Whilst these proposals claim to address both the goal of improving commerce through better encryption and that of facilitating access to encrypted communications by law enforcement, the impact of the proposals is in fact to impair… 
Governmental Access to Encrypted Information - To What Extent and How to Achieve that Extent?
No body can deny the importance of encryption technology in today’s communications, with all the benefits it has also posed some threats, due to which, governments and regulatory bodies have great
Munitions, wiretaps and MP3s
This chapter discusses the changing interface between privacy and encryption policy in the information society by discussing the encryption systems of varying strengths increasingly embedded in consumer software and commercial software.
The motivation and proposition of a privacy-enhancing architecture for operational databases
A requirement for a Privacy-Enhancing Technology for operational databases is established through a consideration of the state of practice and the relevant literature and an architecture for such a technology, which acknowledges and supports this understanding of privacy is proposed.
Electronic Commerce in Nigeria: The Exigency of Combatting Cyber Frauds and Insecurity
Electronic commerce (e-commerce) has grown on such a large scale that there is no commercial activity you cannot embark upon within your home or business premises.  This rapid growth in e-commerce
An Agent Based Burgeoning Framework for Privacy Preserving Information Harvesting Systems
Call it by any epithet, nectar of life or life-giver, the precious mined knowledge nugget from raw data means life to all business applications. As the technology soars to an all time high in this