Results 111 to 120 of about 5,315 (136)
The Dutch miracle: institutions, networks and trust [PDF]
Butter, F.A.G. den, Mosch, R.H.J.
core +2 more sources
Some of the next articles are maybe not open access.
Related searches:
Related searches:
How to bypass the Wassenaar arrangement
Proceedings of the 2000 ACM workshops on Multimedia, 2000The scope of this article is to clarify the current legal and political situation related to electronic surveillance on the one hand, and to export regulations for encryption software on the other hand. We will look at different international agreements, such as the UKUSA agreement and the Wassenaar arrangement, and elaborate on current encryption ...
Franck Leprévost +2 more
exaly +2 more sources
Malware counter-proliferation and the Wassenaar Arrangement
2016 8th International Conference on Cyber Conflict (CyCon), 2016Can states control malware? It is a radical asymmetry: the power of a modern nation-state arrayed against a few hundred thousand bytes of code and its creators, but an imbalance whose counterintuitive nature impacts the security of citizens, corporations, and governments alike.
exaly +2 more sources
US export control policy and Wassenaar Arrangement
Strategic Analysis, 1998(1998). US export control policy and Wassenaar Arrangement. Strategic Analysis: Vol. 22, No. 3, pp. 433-444.
exaly +2 more sources
The Wassenaar Arrangement (WA): How it is Broken and Needs to be Fixed
Defense and Security Analysis, 2008Heinz Gärtner
exaly +3 more sources
The Wassenaar-Arrangement between International Trade, Non-Proliferation, and Export Controls
Journal of World Trade, 1998Hans-Michael Wolffgang +1 more
exaly +2 more sources
The Wassenaar Arrangement: Transparency and Restraint through Trans-Governmental Cooperation?
2017exaly +2 more sources

