Held Wednesday, February 23, 2000
Today's outline does not yet have an overview. Please let me know if you think it should have one.
Today's Question: Should encryption algorithms include a
back door that gives government/police access to files in appropriate situations?
Next Question: What do you see as the biggest danger associated with digital imaging? Why?
What? You think I have a set of notes on ``Public-Key Cryptography'' prepared this far in advance of the class?
Saturday, 22 January 2000
Disclaimer Often, these pages were created "on the fly" with little, if any, proofreading. Any or all of the information on the pages may be incorrect. Please contact me if you notice errors.
This page may be found at http://www.math.grin.edu/~rebelsky/Courses/CS105/2000S/Outlines/outline.19.html
Source text last modified Sat Jan 22 23:36:33 2000.
This page generated on Fri Feb 18 09:40:58 2000 by Siteweaver. Validate this page's HTML.
Contact our webmaster at firstname.lastname@example.org