From: “Joseph M. Reagle Jr.” <reagle@rpcp.mit.edu>
To: (Recipient list suppressed)
Message Hash: b3eaa0194a8fcd8a440e428b625bcdf78054f107ecebf2aeeb5b94797eeb2b90
Message ID: <9603071605.AA04844@rpcp.mit.edu>
Reply To: N/A
UTC Datetime: 1996-03-07 17:59:23 UTC
Raw Date: Fri, 8 Mar 1996 01:59:23 +0800
From: "Joseph M. Reagle Jr." <reagle@rpcp.mit.edu>
Date: Fri, 8 Mar 1996 01:59:23 +0800
To: (Recipient list suppressed)
Subject: Newest CACM and Key Escrow
Message-ID: <9603071605.AA04844@rpcp.mit.edu>
MIME-Version: 1.0
Content-Type: text/plain
The newest Communications of the ACM (March 90) is entitled "How to Use Key
Escrow." I haven't read it yet, but on a quick glance, I don't see some of
the newer schemes I've heard of, but there is an article "taxonomy of key
escrow encryption systems" by Denning and Branstad -- Which does briefly
mention of the Lotus scheme and some of the other published schemes that I
was thinking of.
_______________________
Regards, 8146th member of the CIEC coalition
Joseph Reagle http://farnsworth.mit.edu/~reagle/home.html
reagle@mit.edu 0C 69 D4 E8 F2 70 24 33 B4 5E 5E EC 35 E6 FB 88
Return to March 1996
Return to ““Joseph M. Reagle Jr.” <reagle@rpcp.mit.edu>”
1996-03-07 (Fri, 8 Mar 1996 01:59:23 +0800) - Newest CACM and Key Escrow - “Joseph M. Reagle Jr.” <reagle@rpcp.mit.edu>