The risks of key recovery, key escrow, and trusted third-party encryption. Abelson, H., Anderson, R. J., Bellovin, S. M., Benaloh, J., Blaze, M., Diffie, W., Gilmore, J., Neumann, P. G., Rivest, R. L., Schiller, J. I., & Schneier, B. World Wide Web J., 2:241-257, 1997.
Paper bibtex @article{journals/wwwj/AbelsonABBBDGNR97,
added-at = {2020-08-13T00:00:00.000+0200},
author = {Abelson, Hal and Anderson, Ross J. and Bellovin, Steven M. and Benaloh, Josh and Blaze, Matt and Diffie, Whitfield and Gilmore, John and Neumann, Peter G. and Rivest, Ronald L. and Schiller, Jeffrey I. and Schneier, Bruce},
biburl = {https://www.bibsonomy.org/bibtex/2eeb4e7d3e18563e345e01dafa84cb3d3/dblp},
interhash = {46ac04e33ed43bf52ff45de7d3c40cb5},
intrahash = {eeb4e7d3e18563e345e01dafa84cb3d3},
journal = {World Wide Web J.},
keywords = {dblp},
pages = {241-257},
timestamp = {2020-08-14T11:45:26.000+0200},
title = {The risks of key recovery, key escrow, and trusted third-party encryption.},
url = {http://dblp.uni-trier.de/db/journals/wwwj/wwwj2.html#AbelsonABBBDGNR97},
volume = 2,
year = 1997
}
Downloads: 0
{"_id":"exjvC9XW7Rx4HmHmk","bibbaseid":"abelson-anderson-bellovin-benaloh-blaze-diffie-gilmore-neumann-etal-therisksofkeyrecoverykeyescrowandtrustedthirdpartyencryption-1997","author_short":["Abelson, H.","Anderson, R. J.","Bellovin, S. M.","Benaloh, J.","Blaze, M.","Diffie, W.","Gilmore, J.","Neumann, P. G.","Rivest, R. L.","Schiller, J. I.","Schneier, B."],"bibdata":{"bibtype":"article","type":"article","added-at":"2020-08-13T00:00:00.000+0200","author":[{"propositions":[],"lastnames":["Abelson"],"firstnames":["Hal"],"suffixes":[]},{"propositions":[],"lastnames":["Anderson"],"firstnames":["Ross","J."],"suffixes":[]},{"propositions":[],"lastnames":["Bellovin"],"firstnames":["Steven","M."],"suffixes":[]},{"propositions":[],"lastnames":["Benaloh"],"firstnames":["Josh"],"suffixes":[]},{"propositions":[],"lastnames":["Blaze"],"firstnames":["Matt"],"suffixes":[]},{"propositions":[],"lastnames":["Diffie"],"firstnames":["Whitfield"],"suffixes":[]},{"propositions":[],"lastnames":["Gilmore"],"firstnames":["John"],"suffixes":[]},{"propositions":[],"lastnames":["Neumann"],"firstnames":["Peter","G."],"suffixes":[]},{"propositions":[],"lastnames":["Rivest"],"firstnames":["Ronald","L."],"suffixes":[]},{"propositions":[],"lastnames":["Schiller"],"firstnames":["Jeffrey","I."],"suffixes":[]},{"propositions":[],"lastnames":["Schneier"],"firstnames":["Bruce"],"suffixes":[]}],"biburl":"https://www.bibsonomy.org/bibtex/2eeb4e7d3e18563e345e01dafa84cb3d3/dblp","interhash":"46ac04e33ed43bf52ff45de7d3c40cb5","intrahash":"eeb4e7d3e18563e345e01dafa84cb3d3","journal":"World Wide Web J.","keywords":"dblp","pages":"241-257","timestamp":"2020-08-14T11:45:26.000+0200","title":"The risks of key recovery, key escrow, and trusted third-party encryption.","url":"http://dblp.uni-trier.de/db/journals/wwwj/wwwj2.html#AbelsonABBBDGNR97","volume":"2","year":"1997","bibtex":"@article{journals/wwwj/AbelsonABBBDGNR97,\n added-at = {2020-08-13T00:00:00.000+0200},\n author = {Abelson, Hal and Anderson, Ross J. and Bellovin, Steven M. and Benaloh, Josh and Blaze, Matt and Diffie, Whitfield and Gilmore, John and Neumann, Peter G. and Rivest, Ronald L. and Schiller, Jeffrey I. and Schneier, Bruce},\n biburl = {https://www.bibsonomy.org/bibtex/2eeb4e7d3e18563e345e01dafa84cb3d3/dblp},\n interhash = {46ac04e33ed43bf52ff45de7d3c40cb5},\n intrahash = {eeb4e7d3e18563e345e01dafa84cb3d3},\n journal = {World Wide Web J.},\n keywords = {dblp},\n pages = {241-257},\n timestamp = {2020-08-14T11:45:26.000+0200},\n title = {The risks of key recovery, key escrow, and trusted third-party encryption.},\n url = {http://dblp.uni-trier.de/db/journals/wwwj/wwwj2.html#AbelsonABBBDGNR97},\n volume = 2,\n year = 1997\n}\n\n","author_short":["Abelson, H.","Anderson, R. J.","Bellovin, S. M.","Benaloh, J.","Blaze, M.","Diffie, W.","Gilmore, J.","Neumann, P. G.","Rivest, R. L.","Schiller, J. I.","Schneier, B."],"key":"journals/wwwj/AbelsonABBBDGNR97","id":"journals/wwwj/AbelsonABBBDGNR97","bibbaseid":"abelson-anderson-bellovin-benaloh-blaze-diffie-gilmore-neumann-etal-therisksofkeyrecoverykeyescrowandtrustedthirdpartyencryption-1997","role":"author","urls":{"Paper":"http://dblp.uni-trier.de/db/journals/wwwj/wwwj2.html#AbelsonABBBDGNR97"},"keyword":["dblp"],"metadata":{"authorlinks":{}}},"bibtype":"article","biburl":"http://www.bibsonomy.org/bib/author/Hal?items=1000","dataSources":["Jy4SyfFmJfDm4DM2r"],"keywords":["dblp"],"search_terms":["risks","key","recovery","key","escrow","trusted","third","party","encryption","abelson","anderson","bellovin","benaloh","blaze","diffie","gilmore","neumann","rivest","schiller","schneier"],"title":"The risks of key recovery, key escrow, and trusted third-party encryption.","year":1997}