Wildy logo
(020) 7242 5778
enquiries@wildy.com

Wildy’s Book News

Book News cover photo

Vol 22 No 3 March/April 2017

Book of the Month

Cover of Company Directors: Duties, Liabilities and Remedies

Company Directors: Duties, Liabilities and Remedies

Edited by: Simon Mortimore
Price: £225.00

Pupillage & Student Offers

Special Discounts for Pupils, Newly Called & Students

Read More ...


Secondhand & Out of Print

Browse Secondhand Online

Read More...


UK Public Holiday May 2017

Wildy's will be closed on Monday 1st May and will re-open on Tuesday 2nd May.

Online book orders received during the time we are closed will be processed as soon as possible once we re-open on Tuesday.

As usual Credit Cards will not be charged until the order is processed and ready to despatch.

Any non-UK eBook orders placed after 5pm on the Friday 28th April will not be processed until Tuesday 2nd May. UK eBook orders will be processed as normal.

Hide this message

The Limits of Trust: Cryptography, Governments, and Electronic Commerce

Image not available lge

ISBN13: 9789041106353
ISBN: 9041106359
Published: June 1998
Publisher: Kluwer Law International
Country of Publication: The Netherlands
Format: Hardback
Price: £190.00



Despatched in 11 to 13 days.

For the first time in history, everyone - Third World freedom fighters to urban drug dealers - can communicate in secrecy via unbreakable codes made available by advances in cryptography and computer technology. As the welcome and unwelcome consequences of this new technology begin to dawn on governments worldwide, responses have varied from stringent regulation to laissez faire liberalism. Written by a former General Counsel of the National Security Agency and an expert in cryptography law, this text explores the policy and legal issues raised by the democratization of cryptography and offers a guide to the ways in which the law of cryptography translates issues of trust into standards for lawful conduct.;The book addresses the international regulation of cryptography and digital signatures both in terms of confidentiality (cryptography used to keep secrets) and authentication (cryptography used to verify information).;Coverage includes: a description of over 45 countries' policies and laws on cryptography import, export, and domestic controls and digital signature initiatives worldwide; a concise history of the cryptography debate in the United States from its beginnings after World War II to the recent debates over the Clipper Chip and key recovery encryption; and a presentation of the efforts of the United States government (and others) to build a new national consensus on regulation of encryption.

Image not available lge
Contents:
Introducting confidentiality and authentication.
Part 1 Confidentiality: overview of the United States policy debate; United States' policy towards the export of cryptography; international initiatives addressing cryptography; section 1 - the OECD; section 2 - Wassenaar Arrangement; country-by-country guide to encryption regulation.
Part 2 Authentication: authentication, cryptography and digital signatures; digital signatures - an overview of the legal issues; consequences of the current legislative approaches; international guide to digital signature regulation; section 1 - international organizations; section 2 - country survey.