Search (2 results, page 1 of 1)

  • × author_ss:"McMurdo, G."
  • × theme_ss:"Internet"
  1. McMurdo, G.: Pretty good encryption (1996) 0.04
    0.03509156 = product of:
      0.07018312 = sum of:
        0.07018312 = sum of:
          0.033119414 = weight(_text_:r in 4978) [ClassicSimilarity], result of:
            0.033119414 = score(doc=4978,freq=2.0), product of:
              0.15092614 = queryWeight, product of:
                3.3102584 = idf(docFreq=4387, maxDocs=44218)
                0.045593463 = queryNorm
              0.2194412 = fieldWeight in 4978, product of:
                1.4142135 = tf(freq=2.0), with freq of:
                  2.0 = termFreq=2.0
                3.3102584 = idf(docFreq=4387, maxDocs=44218)
                0.046875 = fieldNorm(doc=4978)
          0.037063707 = weight(_text_:22 in 4978) [ClassicSimilarity], result of:
            0.037063707 = score(doc=4978,freq=2.0), product of:
              0.15966053 = queryWeight, product of:
                3.5018296 = idf(docFreq=3622, maxDocs=44218)
                0.045593463 = queryNorm
              0.23214069 = fieldWeight in 4978, product of:
                1.4142135 = tf(freq=2.0), with freq of:
                  2.0 = termFreq=2.0
                3.5018296 = idf(docFreq=3622, maxDocs=44218)
                0.046875 = fieldNorm(doc=4978)
      0.5 = coord(1/2)
    
    Abstract
    The use of codes and other methods of concealing the contents of messages is as old as recorded information. With the advent of computer communication, the need for a method of ensuring secure communication over insecure channels, such as the Internet, has seen an increased demand for good cryptography. However, the recent availability of public domain public key encryption software, such as Philip R. Zimmermann's Pretty Good privacy (PGP), has been seen by some as betraying the principles of security and has raised issues of national communication policy and personal privacy. In the USA, the government's Clipper encryption chip initiative sought to implement a key escrow system which would enable law enforcement agencies to wiretap all digital communication. Civil liberty opponents of key escrow systems argue that they will not affect criminals, and fear that they can only be made effective by banning the use of alternative encryption systems, such as PGP. Describes methods for obtaining and using PGP to encrypt and decrypt electronic mail messages
    Source
    Journal of information science. 22(1996) no.2, S.133-146
  2. McMurdo, G.: Evaluating Web information and design (1998) 0.02
    0.018531853 = product of:
      0.037063707 = sum of:
        0.037063707 = product of:
          0.07412741 = sum of:
            0.07412741 = weight(_text_:22 in 2831) [ClassicSimilarity], result of:
              0.07412741 = score(doc=2831,freq=2.0), product of:
                0.15966053 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.045593463 = queryNorm
                0.46428138 = fieldWeight in 2831, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.09375 = fieldNorm(doc=2831)
          0.5 = coord(1/2)
      0.5 = coord(1/2)
    
    Date
    22. 1.1999 18:38:39