Skip to content

Privacy on the Line The Politics of Wiretapping and Encryption

ISBN-10: 0262042401

ISBN-13: 9780262042406

Edition: 2nd 2007

Authors: Whitfield Diffie, Susan Landau

List price: $7.75
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

Telecommunication has never been perfectly secure, as the Cold War culture of wiretaps and international spying taught us. Yet many of us still take our privacy for granted, even as we become more reliant than ever on telephones, computer networks, and electronic transactions of all kinds. So many of our relationships now use telecommunication as the primary mode of communication that the security of these transactions has become a source of wide public concern and debate. Whitfield Diffie and Susan Landau argue that if we are to retain the privacy that characterized face-to-face relationships in the past, we must build the means of protecting that privacy into our communication systems. Diffie and Landau examine the national-security, law-enforcement, commercial, and civil-liberties issues. They discuss privacy's social function, how it underlies a democratic society, and what happens when it is lost. They also explore how intelligence and law-enforcement organizations work, how they intercept communications, and how they use what they intercept.
Customers also bought

Book details

List price: $7.75
Edition: 2nd
Copyright year: 2007
Publisher: MIT Press
Publication date: 3/30/2007
Binding: Hardcover
Pages: 496
Size: 6.50" wide x 9.25" long x 1.75" tall
Weight: 1.848

Whitfield Diffie, the inventor of public-key cryptography, is Visiting Professor at Royal Holloway College at the Universityof London.

Preface to the Updated and Expanded Edition
Preface to the First Edition
Acknowledgements
Introduction
Cryptography
Cryptography and Public Policy
National Security
Law Enforcement
Privacy: Protections and Threats
Wiretapping
Communications in the 1990s
Cryptography in the 1990s
And Then It All Changed
Apres le Deluge
Conclusion
Notes
Glossary
Bibliography
Index