Results 111 to 120 of about 5,315 (136)

Deep sequencing of 16 Ixodes ricinus ticks unveils insights into their interactions with endosymbionts

open access: yes
Lesiczka PM   +10 more
europepmc   +1 more source

How to bypass the Wassenaar arrangement

Proceedings of the 2000 ACM workshops on Multimedia, 2000
The scope of this article is to clarify the current legal and political situation related to electronic surveillance on the one hand, and to export regulations for encryption software on the other hand. We will look at different international agreements, such as the UKUSA agreement and the Wassenaar arrangement, and elaborate on current encryption ...
Franck Leprévost   +2 more
exaly   +2 more sources

Malware counter-proliferation and the Wassenaar Arrangement

2016 8th International Conference on Cyber Conflict (CyCon), 2016
Can states control malware? It is a radical asymmetry: the power of a modern nation-state arrayed against a few hundred thousand bytes of code and its creators, but an imbalance whose counterintuitive nature impacts the security of citizens, corporations, and governments alike.
exaly   +2 more sources

US export control policy and Wassenaar Arrangement

Strategic Analysis, 1998
(1998). US export control policy and Wassenaar Arrangement. Strategic Analysis: Vol. 22, No. 3, pp. 433-444.
exaly   +2 more sources

Home - About - Disclaimer - Privacy