Open Preview See a Problem? Details if other :. Thanks for telling us about the problem. Return to Book Page. Susan Landau. Telecommunication has never been perfectly secure, as the Cold War culture of wiretaps and international spying taught us. Yet many of us still take our privacy for granted, even as we become more reliant than ever on telephones, computer networks, and electronic transactions of all kinds.
So many of our relationships now use telecommunication as the primary mode of commun Telecommunication has never been perfectly secure, as the Cold War culture of wiretaps and international spying taught us. So many of our relationships now use telecommunication as the primary mode of communication that the security of these transactions has become a source of wide public concern and debate. Whitfield Diffie and Susan Landau argue that if we are to retain the privacy that characterized face-to-face relationships in the past, we must build the means of protecting that privacy into our communication systems.
Diffie and Landau examine the national-security, law-enforcement, commercial, and civil-liberties issues. They discuss privacy's social function, how it underlies a democratic society, and what happens when it is lost. They also explore how intelligence and law-enforcement organizations work, how they intercept communications, and how they use what they intercept.
Get A Copy. More Details Original Title. Other Editions 6. Friend Reviews. To see what your friends thought of this book, please sign up. To ask other readers questions about Privacy On The Line , please sign up.
The politics of wiretapping and encryption | Computerworld
Lists with This Book. This book is not yet featured on Listopia.
Community Reviews. Rescorla, F. Schneider, B. Schneier, H. Shacham, M. Sherr, D. Wagner, and P. Clark, and S. Blaze and S. Landwehr, D.
See a Problem?
Boneh, J. Mitchell, S. Landau, and M. Bradner, W. Diffie, S. Landau, and J. Rexford, Can It Really Work? A short version of this paper appeared as As simple as possiblebut not more so, S. Landau, J. Landau, Surveillance or Security?
The politics of wiretapping and encryption
Clark and S. Policy, National Academies Press, , pp. Diffie and S. Neumann, and J. Blaze, E. Brickell, C. Brooks, V. Cerf, W. Peterson, J. Landau and M. Landau, C. Landwehr, and F. Originally appeared in Treichel, Jeanie and Mary Holzer eds. Sun Labs Tech Report Landau, "The Threat of. Landau and W. Landau, Eavesdropping and Encryption: U. Kennedy School of Government, Harvard University. Landau, S. Kent, C.
Brooks, S. Charney, D. Denning, W. Diffie, A. Lauck, D.
Miller, P. Neumann and D. Stephen Kent, Chief Scientist - Security Technology, Bolt, Beranek and Newman, chaired the panel, which consisted of senior members of the cryptography and security communities, including members of the government, industry, and academia. Landau, entries for "Clipper and Capstone"; "cryptography"; "digital signatures," in William Staples, ed. Encyclopedia of Privacy, Greenwood Press, Landau, "Cryptography.
Landau, Is it Legal? Is it Right? Cavoukian, A. Davidson, M. Hansen, S. Landau, and A. Landau and T. An earlier version appeared at Workshop on Economics of Information Security, Landau, H. Le Van Gong, and R. Identity Management S. Earlier version appeared at Workshop on Economics of Information Security, Landau and D.
Landau and J. Ellison, J. Hodges, and S. Digital Rights Management S. Landau, R. Stratulate, and D. Papadopoulos and S. Landau, " Innovate, Createand Compensate! Symbolic Computation S.
Landau, "Computations with Algebraic Numbers," in J. Grabmeier, E. Kaltofen, and V. Weispfennig eds. Landau and N. Kozen, S. Landau, and R.
Privacy on the Line: The Politics of Wiretapping and Encryption -- Updated and Expanded Edition
A preliminary version appeared in Algorithmic Number Theory Symposium Cremona and S. Kozen and S. Landau, Polynomial Decomposition Algorithms , J. Appeared in a different version as J. Landau and G. Complexity N. Immerman and S.