From: jya@pipeline.com (John Young)
To: cypherpunks@toad.com
Message Hash: a4b49b7fde267e43d503b4589eff0b757538815368fbbb12c1d750f026ecc3ea
Message ID: <199605311656.QAA04259@pipe3.t1.usa.pipeline.com>
Reply To: N/A
UTC Datetime: 1996-05-31 23:54:01 UTC
Raw Date: Sat, 1 Jun 1996 07:54:01 +0800
From: jya@pipeline.com (John Young)
Date: Sat, 1 Jun 1996 07:54:01 +0800
To: cypherpunks@toad.com
Subject: NRC Report, 0, 1, 2
Message-ID: <199605311656.QAA04259@pipe3.t1.usa.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain
The first parts of the full NRC report are filed at our Web
site:
Preface, Executive Summary and Road Map:
http://pwp.usa.pipeline.com/~jya/nrc00.txt (92 kb)
Part I -- Framing the Policy Issues
Chapter 1 Growing Vulnerability in the Information Age
http://pwp.usa.pipeline.com/~jya/nrc01.txt (101 kb)
Chapter 2 Cryptography: Roles, Market and Infrastructure
http://pwp.usa.pipeline.com/~jya/nrc02.txt (80 kb)
---------
Remaining 6 chapters and 14 appendices to be announced as
completed.
---------
Declan reports that an on-line version is due next week.
Note that National Academy Press is accepting orders for
the printed version, $45.00 + s/h each. For August.
National Academy Press, 2101 Constitution Ave, NW, Lockbox
285, Washington, DC 20055. Tel 1-800-624-6242.
Return to May 1996
Return to “jya@pipeline.com (John Young)”
1996-05-31 (Sat, 1 Jun 1996 07:54:01 +0800) - NRC Report, 0, 1, 2 - jya@pipeline.com (John Young)