Search (4 results, page 1 of 1)

  • × author_ss:"McMurdo, G."
  • × theme_ss:"Internet"
  1. McMurdo, G.: Pretty good encryption (1996) 0.01
    0.0076993788 = product of:
      0.023098135 = sum of:
        0.005354538 = weight(_text_:in in 4978) [ClassicSimilarity], result of:
          0.005354538 = score(doc=4978,freq=2.0), product of:
            0.059380736 = queryWeight, product of:
              1.3602545 = idf(docFreq=30841, maxDocs=44218)
              0.043654136 = queryNorm
            0.09017298 = fieldWeight in 4978, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              1.3602545 = idf(docFreq=30841, maxDocs=44218)
              0.046875 = fieldNorm(doc=4978)
        0.017743597 = product of:
          0.035487194 = sum of:
            0.035487194 = weight(_text_:22 in 4978) [ClassicSimilarity], result of:
              0.035487194 = score(doc=4978,freq=2.0), product of:
                0.15286934 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.043654136 = queryNorm
                0.23214069 = fieldWeight in 4978, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.046875 = fieldNorm(doc=4978)
          0.5 = coord(1/2)
      0.33333334 = coord(2/6)
    
    Abstract
    The use of codes and other methods of concealing the contents of messages is as old as recorded information. With the advent of computer communication, the need for a method of ensuring secure communication over insecure channels, such as the Internet, has seen an increased demand for good cryptography. However, the recent availability of public domain public key encryption software, such as Philip R. Zimmermann's Pretty Good privacy (PGP), has been seen by some as betraying the principles of security and has raised issues of national communication policy and personal privacy. In the USA, the government's Clipper encryption chip initiative sought to implement a key escrow system which would enable law enforcement agencies to wiretap all digital communication. Civil liberty opponents of key escrow systems argue that they will not affect criminals, and fear that they can only be made effective by banning the use of alternative encryption systems, such as PGP. Describes methods for obtaining and using PGP to encrypt and decrypt electronic mail messages
    Source
    Journal of information science. 22(1996) no.2, S.133-146
  2. McMurdo, G.: Evaluating Web information and design (1998) 0.01
    0.0059145326 = product of:
      0.035487194 = sum of:
        0.035487194 = product of:
          0.07097439 = sum of:
            0.07097439 = weight(_text_:22 in 2831) [ClassicSimilarity], result of:
              0.07097439 = score(doc=2831,freq=2.0), product of:
                0.15286934 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.043654136 = queryNorm
                0.46428138 = fieldWeight in 2831, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.09375 = fieldNorm(doc=2831)
          0.5 = coord(1/2)
      0.16666667 = coord(1/6)
    
    Date
    22. 1.1999 18:38:39
  3. McMurdo, G.: Indexing the Internet (1994) 0.00
    0.0011898974 = product of:
      0.0071393843 = sum of:
        0.0071393843 = weight(_text_:in in 2178) [ClassicSimilarity], result of:
          0.0071393843 = score(doc=2178,freq=2.0), product of:
            0.059380736 = queryWeight, product of:
              1.3602545 = idf(docFreq=30841, maxDocs=44218)
              0.043654136 = queryNorm
            0.120230645 = fieldWeight in 2178, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              1.3602545 = idf(docFreq=30841, maxDocs=44218)
              0.0625 = fieldNorm(doc=2178)
      0.16666667 = coord(1/6)
    
    Abstract
    Examines the extent to which the Internet can be said to be 'indexed' from the perspective of librarians and information scientists. The scope and characteristics of the main Internet document and information finding tools as information retrieval system are reviewed and discussed. Explores analogies and contrasts, both with contemporary 'conventional' online indexed IR, and also with some historical developments in information retrieval theory and practice
  4. McMurdo, G.: How the Internet was indexed (1995) 0.00
    8.9242304E-4 = product of:
      0.005354538 = sum of:
        0.005354538 = weight(_text_:in in 2411) [ClassicSimilarity], result of:
          0.005354538 = score(doc=2411,freq=2.0), product of:
            0.059380736 = queryWeight, product of:
              1.3602545 = idf(docFreq=30841, maxDocs=44218)
              0.043654136 = queryNorm
            0.09017298 = fieldWeight in 2411, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              1.3602545 = idf(docFreq=30841, maxDocs=44218)
              0.046875 = fieldNorm(doc=2411)
      0.16666667 = coord(1/6)
    
    Abstract
    The scope and characteristics of what may be considered the first three generations of automated Internet indexing systems are identified and described as to their methods of compiling their datasets, their search interfaces and the associated etymological metaphors and mythologies. These three are suggested to be: firstly, the Archie system for single keyword and regular expression searches of the file lists of anonymous ftp sites: secondly, the Veronica system for Boolean keyword in title searches of the world's gopher servers; thirdly, a range of software techniques jnown as robots and search engines, which compile searchable databases of information accessible via the WWW, such as the currently popular Lycos project at Carnegie Mellon University. The present dominance of WWW client software as the preferred interface to Internet information has led to provision of methods of also using the first two systems by this single interface, and these are also noted