Everyone is a proponent of strong encryption.
I don't have a particular recommendation other than that we base decisions on as much hard data as possible. We need to carefully look at all the opt… - Dorothy E. Denning
I don't have a particular recommendation other than that we base decisions on as much hard data as possible. We need to carefully look at all the opt…
- Dorothy E. Denning
Everyone is a proponent of strong encryption. - Dorothy E. Denning
However, leaving everything to the market is not necessarily good for society. - Dorothy E. Denning
However, leaving everything to the market is not necessarily good for society.
I favor strategies that encourage industry to include some sort of key recovery capability in their systems which would also address user requirement… - Dorothy E. Denning
I favor strategies that encourage industry to include some sort of key recovery capability in their systems which would also address user requirement…
Although cyber attacks have caused billions of dollars in damage and affected the lives of millions, few if any can be characterised as acts of terro… - Dorothy E. Denning
Although cyber attacks have caused billions of dollars in damage and affected the lives of millions, few if any can be characterised as acts of terro…
I prefer leaving things to the market as much as possible. - Dorothy E. Denning
I prefer leaving things to the market as much as possible.
The concern is over what will happen as strong encryption becomes commonplace with all digital communications and stored data. Right now the use of e… - Dorothy E. Denning
The concern is over what will happen as strong encryption becomes commonplace with all digital communications and stored data. Right now the use of e…
Generally I'm against regulation. - Dorothy E. Denning
Generally I'm against regulation.
If we take as given that critical infrastructures are vulnerable to a cyber terrorist attack, then the question becomes whether there are actors with… - Dorothy E. Denning
If we take as given that critical infrastructures are vulnerable to a cyber terrorist attack, then the question becomes whether there are actors with…
Login to join the discussion
Login to join the discussion