From: jya@pipeline.com (John Young)
To: cypherpunks@toad.com
Message Hash: 1201cafdb8c0d25b41b282bd44a5263cab1524c1264670d74bd7002fe4ab8e23
Message ID: <199605242134.VAA13386@pipe2.t1.usa.pipeline.com>
Reply To: N/A
UTC Datetime: 1996-05-25 02:55:35 UTC
Raw Date: Sat, 25 May 1996 10:55:35 +0800
From: jya@pipeline.com (John Young)
Date: Sat, 25 May 1996 10:55:35 +0800
To: cypherpunks@toad.com
Subject: Denning Sums Key Escrow
Message-ID: <199605242134.VAA13386@pipe2.t1.usa.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain
Professor Dorothy Denning has an impressive accounting of 30+
key escrow systems, dated May 1, 1996, at:
http://guru.cosc.georgetown.edu/~denning/crypto/Appendix.html
This pointer came from "Marg's" report on a Denning seminar
in February at:
http://www.dstc.qut.edu.au/MSU/staff/marg/denning-sem.html
Marg's site also has pointers to an impressive array of
worldwide E-commerce and security links at:
http://www.dstc.qut.edu.au/MSU/staff/marg/ecom.html
-----
Thanks much, Marg.
Return to May 1996
Return to “jya@pipeline.com (John Young)”
1996-05-25 (Sat, 25 May 1996 10:55:35 +0800) - Denning Sums Key Escrow - jya@pipeline.com (John Young)