1996-05-31 - NRC Report, 0, 1, 2

Header Data

From: jya@pipeline.com (John Young)
To: cypherpunks@toad.com
Message Hash: a4b49b7fde267e43d503b4589eff0b757538815368fbbb12c1d750f026ecc3ea
Message ID: <199605311656.QAA04259@pipe3.t1.usa.pipeline.com>
Reply To: N/A
UTC Datetime: 1996-05-31 23:54:01 UTC
Raw Date: Sat, 1 Jun 1996 07:54:01 +0800

Raw message

From: jya@pipeline.com (John Young)
Date: Sat, 1 Jun 1996 07:54:01 +0800
To: cypherpunks@toad.com
Subject: NRC Report, 0, 1, 2
Message-ID: <199605311656.QAA04259@pipe3.t1.usa.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain


   The first parts of the full NRC report are filed at our Web 
   site: 
 
 
   Preface, Executive Summary and Road Map: 
 
      http://pwp.usa.pipeline.com/~jya/nrc00.txt  (92 kb) 
 
 
   Part I -- Framing the Policy Issues 
 
   Chapter 1  Growing Vulnerability in the Information Age 
 
      http://pwp.usa.pipeline.com/~jya/nrc01.txt  (101 kb) 
 
 
   Chapter 2  Cryptography: Roles, Market and Infrastructure 
 
      http://pwp.usa.pipeline.com/~jya/nrc02.txt  (80 kb) 
 
   --------- 
 
   Remaining 6 chapters and 14 appendices to be announced as 
   completed. 
 
   --------- 
 
   Declan reports that an on-line version is due next week. 
 
   Note that National Academy Press is accepting orders for 
   the printed version, $45.00 + s/h each. For August. 
 
   National Academy Press, 2101 Constitution Ave, NW, Lockbox 
   285, Washington, DC 20055. Tel 1-800-624-6242. 
 
 
 
 
 
 





Thread