000022764 000__ 03172cam\a2200445\i\4500 000022764 001__ 22764 000022764 003__ SzGeWIPO 000022764 005__ 20210318104906.0 000022764 008__ 980519s1998\\\\ne\\\\\\rb\\\\000\0\eng\\ 000022764 020__ $$a9041106359 000022764 020__ $$z9789041106353 000022764 020__ $$z9041106391$$qsoftcover 000022764 020__ $$z9789041106391$$qsoftcover 000022764 035__ $$a(wipo)(CD )99-0325 000022764 035__ $$a(OCoLC)39354220 000022764 040__ $$aSzGeWIPO$$beng$$erda$$cSzGeWIPO$$dCaBNVSL 000022764 050_4 $$aK564.C6$$bB35 1998 000022764 08204 $$a005.82$$221 000022764 084__ $$aF 637 BAK.L 000022764 090__ $$c24801$$d24801 000022764 1001_ $$aBaker, Stewart A.$$q(Stewart Abercrombie),$$d1947-$$eauthor. 000022764 24514 $$aThe limits of trust :$$bcryptography, governments, and electronic commerce /$$cby Stewart A. Baker and Paul R. Hurst. 000022764 264_1 $$aThe Hague :$$bKluwer Law International,$$cc1998. 000022764 300__ $$axviii, 621 pages ;$$c24 cm 000022764 336__ $$atext$$btxt$$2rdacontent 000022764 337__ $$aunmediated$$bn$$2rdamedia 000022764 338__ $$avolume$$bnc$$2rdacarrier 000022764 500__ $$aElectronic updates of this book may be found at : http://www.steptoe.com/crypto.nsf;. 000022764 5050_ $$aCh. 1. Introducing Confidentiality and Authentication -- Pt. I. Confidentiality. Ch. 2. Overview of the United States Policy Debate. Ch. 3. United States' Policy Towards The Export of Cryptography. Ch. 4. International Initiatives Addressing Cryptography. Ch. 5. Country-By-Country Guide to Encryption Regulation -- Essay: Australian Cryptography Policy -- 1998 / William J. (Bill) Caelli -- Essay: The New French Encryption Regulations / Bertrand Warusfel -- Essay: Cryptography Regulation in Germany / Christopher Kuner -- Israel: Cryptography Law and Policy / Ori Rosen -- Essay: Japanese Cryptography Policy / Noriaki Hashimoto -- Essay: Cryptography Policy -- The United Kingdom Perspective / Henry Beker and Chris Amery -- Pt. II. Authentication. Ch. 6. Authentication, Cryptography, and Digital Signatures. Ch. 7. Digital Signatures -- An Overview of the Legal Issues. Ch. 8. Consequences of the Current Legislative Approaches. Ch. 9. International Guide to Digital Signature Regulation. 000022764 5208_ $$aFor the first time in history, everyone - Third World freedom fighters to urban drug dealers - can communicate in secrecy via unbreakable codes made available by advances in cryptography and computer technology. As the welcome and unwelcome consequences of this new technology begin to dawn on governments worldwide, responses have varied from stringent regulation to laissez faire liberalism. Written by a former General Counsel of the National Security Agency and an expert in cryptography law, this text explores the policy and legal issues raised by the democratization of cryptography and offers a guide to the ways in which the law of cryptography translates issues of trust into standards for lawful conduct. 000022764 650_0 $$aData encryption (Computer science)$$xLaw and legislation. 000022764 650_4 $$aINFORMATION SECURITY 000022764 650_4 $$aCRYPTOGRAPHY 000022764 650_4 $$aE-COMMERCE 000022764 650_4 $$aENCRYPTION 000022764 7001_ $$aHurst, Paul R. 000022764 903__ $$v1 000022764 942__ $$cMON 000022764 952__ $$w2006-11-03$$p1999-0325$$r231.00$$u35774$$bMAIN$$10$$kF 637 BAK.L$$v1999-02-15$$zTagged$$71 000022764 980__ $$aBIB 000022764 999__ $$c24801$$d24801