The EFF has made available for download the briefs filed in opposition to
the preliminary injunction requested by the DVD Copy Control Association in
the DeCSS case. The plaintiff has until the 12th to file their response. The
PI hearing will be held on the 14th.
http://www.eff.org/pub/In
Thanks to Will Rodger we offer the National Plan
for Information Systems Protection, Executive Summary,
released by the White House on January 7:
http://cryptome.org/cybersec-plan.htm (109K)
Zipped:
http://cryptome.org/cybersec-plan.zip (32K)
For those of you that follow the DeCSS case, there is an excellent site that
offers not only all legal documents, but also features relevant press
clippings and additional information on copyright and IP issues. Lot's of
background material is available as well.
http://www.virtualrecordings.com/m
I've agreed to teach an in depth introduction to crypto at Stevens,
which is an engineering school across the river from Manhattan in
Hoboken, NJ. I'm posting this largely just in case someone out there
really wants to enroll in such a course, doesn't otherwise know where
to find one, and happens
Folks,
I'm giving a talk at the RSA show next week entitled "An Unconventional
Look at the History of the Cryptography Industry." The idea is to give the
attendees, in particular those who haven't been involved in crypto and
security for a while, a taste of some of the strange things that
Friends,
I am engaged in an expansive and challenging authoring assignment
regarding PKI's rationale in the large e-commerce plexus. I'm casting
about for ideas on the killer PKI application. I'd like to hear any ideas
- however wild or domesticated - in this space. I can repay all kindnesses
wi
- Forwarded message from Peter Cassidy -
Date: Mon, 10 Jan 2000 18:08:00 -0500 (EST)
From: Peter Cassidy <[EMAIL PROTECTED]>
Subject: Killer PKI Applications
I am engaged in an expansive and challenging authoring assignment
regarding PKI's rationale in the large e-commerce plexus. I'm
Found this somewere.
Any coments?
/Per
16 December 1999
Joint statement by Chairman GSM Association Security Group and
Chairman ETSI SMG10 Security Group
Many questions were raised by the paper of Alex Biryukov and Adi
Shamir [1] on the GSM A5/1 over the air encryption algorithm, we would
l