Invited Talks TrackWednesday, August 16Computer System Security: Is There Really a Threat?Dave Dittrich, Univ of Washington The Insecurity Industry
Trust-Management
Pitfalls of PKI | PDF
Thursday, August 17The Practical Use of Cryptography in Human Rights GroupsSuelette Dreyfus, Author Privacy-Degrading Technologies: How Not to Build the Future
Methods for
Detecting Addressable Promiscuous Devices
|
Need help? Use our Contacts page.
Last changed: 29 Sep 2000 bleu |
|