Stanford CIS

Blog

Showing - of 5024

Blog

Video shows Bush Katrina warning

This is amazing.  When I saw this headline I was stumped as to how there was video of Bush being briefed?  There was a reporter in the room?  This is a next-gen…

Blog

P2P-TC

Xinwen Zhang et al., Enhancing Data Authenticity and Integrity in P2P Systems, IEEE Internet Computing, November/December 2005, pp. 42-49.…

Blog

Best Practices 2.0

TCG Best Practices Committee, Design, Implementation, and Usage Principles, Version 2.0, December 2005.…

Blog

New Best Practices Version

In December 2005, the TCG published an updated version of its Best Practices document. It is available here.…

Blog

Google/DOJ Subpoena and ECPA

In its response to the DOJ's motion to compel compliance with the subpoena requesting URLs and search queries, Google argued briefly that the Electronic Com…

Blog

iPods as educational tools?

As a recent graduate of Duke, I have been very interested in Duke’s use of ipods in the classroom.  My interest may stem from bitterness and envy rather than cu…

Blog

JD Lasica

NOTE NEW DATE Monday February 27, 2006 12:30-1:30 PM Room 280A Stanford Law School Open to All Lunch Served In recent years we've seen the emergence of ne…

Blog

TC talk @ Harvard [Update]

On March 7, I gave talk on trusted computing at the Berkman Center at Harvard Law School. An audio recording is available here.  It is also available on iTunes.…