|
- Applied Cryptography
Protocols, Algorithms, and Source Code in C (Second Edition) Resource Type: Book Published: 1995 Data security expert, Schneier, provides information on the protocols and algorithms used to implement a variety of impenetrable encryptions.
- The Great SIM Heist: How Spies Stole the Keys to the Encryption Castle
Resource Type: Article Published: 2015 American and British spies hacked into the internal computer network of the largest manufacturer of SIM cards in the world, stealing encryption keys used to protect the privacy of cellphone communications across the globe, according to top-secret documents provided by National Security Agency whistleblower Edward Snowden.
- IntelligentSearch.ca
Resource Type: Website Published: 2017 A web portal featuring topics related to research and the Internet. The home page features a selection of recent and important articles. A search feature, subject index, and other research tools make it possible to find additional resources and information.
- U.N. Report Asserts Encryption as a Human Right in the Digital Age
Resource Type: Article Published: 2015 Encryption is not the refuge of scoundrels, as Obama administration law-enforcement officials loudly proclaim it is an essential tool needed to protect the right of freedom of opinion and expression in the digital age, a new United Nations report concludes.
|
AlterLinks
© 2021.
|
|
|
|