Quantum crypto, up and running
So I guess the Swiss have an operational data archiving network utilizing quantum cryptography for security. For those who have not followed the crypto revoluti…
So I guess the Swiss have an operational data archiving network utilizing quantum cryptography for security. For those who have not followed the crypto revoluti…
So today I won a prize. A mini-iPod. It is quite the toy, however, I run this strange, mystical operating system called Linux, that Apple seems to pretend doesn…
BayFF Event - "E-voting and the Upcoming Election" on Tuesday, October 12 at 7pm Sometimes activism can be fun. Come join EFF at the 111 Minna Galler…
A federal judge in Texas lets loose on counsel in an absolutely fantastic opinion. A must-read.…
LibraryLaw Blog: Locking up Hemingway about unpublished short story from 1924 not being able to be pub b/c of lit executors + CTEA.…
At a hearing on February 3, 2004, the Court denied defendant's motion for fees and costs under the California Anti-SLAPP statute. In reaching it's deci…
still have tech problems -- new posts at http://academiccopyright.typepad.com on duration (charts that are helpful) and more on the MT papers and the unpublishe…
My other blog Academiccopyright.typepad.com got some attention from COPYFIGHT Corante > Copyfight this weekend, along with a mention on SIVACRACY.NET: Siva V…
Surprised this hasn't gotten more coverage. VeriSign has just announced a new USB key that they claim will assist in identifying children online. This kind…
Vivek Haldar & Michael Franz, Symmetric Behavior-Based Trust: A New Paradigm for Internet Computing, in: Marceau & Foley (eds.), New Security Paradigms…
Martín Abadi & Ted Wobber, A Logical Account of NGSCB, in: de Frutos-Escrig & Núñez (eds.), Formal Techniques for Networked and Distributed Systems (FO…
Daniel Gustafsson & Tomas Stewén, Trusted Computing & Digital Rights Management - Theory & Effects, University of Växjö (Sweden) Report 04086, Septe…