Cryptography and Competition Policy - Issues with ‘Trusted Computing’

  • Ross Anderson
Part of the Advances in Information Security book series (ADIS, volume 12)


Switching Cost Information Security Price Discrimination Competition Policy Digital Right Management 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. RJ Anderson, ‘Security Engineering-a Guide to Building Dependable Distributed Systems’, Wiley (2001) ISBN 0-471-38922-6Google Scholar
  2. RJ Anderson, “TCPA/Palladium FAQ”, at
  3. M Magee, “HP inkjet cartridges have built-in expiry dates-Carly’s cunning consumable plan”, The Inquirer, 29 April 2003, at
  4. M Broersma, “Printer makers rapped over refill restrictions”, ZDnet Dec 20 2002, at
  5. HR Varian, “New Chips Can Keep a Tight Rein on Customers”, New York Times July 4 2002, at
  6. D Becker, “Sony loses Australian copyright case”, on, July 26 2002, at
  7. N Pickler, “Mechanics Struggle With Diagnostics”, AP, June 24 2002; previously at; pulled after being referenced in [TCPA-FAQ]; now archived at
  8. LM Ausubel, P Milgrom, “Ascending Auctions with Package Bidding”, 2002, at
  9. Trusted Computing Group,
  10. J Lettice “Bad publicity, clashes trigger MS Palladium name change”, The Register, Jan 27 2003, at
  11. R Stallman, “Can you trust your computer?”, at
  12. Microsoft Corp., “Windows Server 2003”, Feb 20, 2003, at
  13. J Manferdelli, “An Open and Interoperable Foundation for Secure Computing”, in Windows Trusted Platform Technologies Information Newsletter March 2003Google Scholar
  14. A Huang, “Keeping Secrets in Hardware: the Microsoft Xbox Case Study”, May 26 2002, at
  15. P Thurrott, “Microsoft’s Secret Plan to Secure the PC”, WinInfo, June 23, 2002, at
  16. S Lewis, “How Much is Stronger DRM Worth?” at Second International Workshop on Economics and Information Security, at
  17. SE Schechter, RA Greenstadt, MD Smith, “Trusted Computing, Peer-To-Peer Distribution, and the Economics of Pirated Entertainment”, at Second International Workshop on Economics and Information Security, at
  18. C Shapiro, H Varian, ‘Information Rules’, Harvard Business School Press (1998), ISBN 0-87584-863-XGoogle Scholar
  19. A Gawer, MA Cusumano, “Platform Leadership: How Intel, Microsoft, and Cisco Drive Industry Innovation”, Harvard Business School Press (2002), ISBN 1-57851-514-9Google Scholar
  20. J Brockmeier, “The Ultimate Lock-In”, Yahoo News. Mar 12 2003, at
  21. RJ Anderson, “Why Information Security is Hard-An Economic Perspective”, in Proceedings of the Seventeenth Computer Security Applications Conference IEEE Computer Society Press (2001), ISBN 0-7695-1405-7, pp 358–365, at
  22. C Shapiro, “Antitrust Limits to Patent Settlements”, preprint, at

Copyright information

© Springer Science + Business Media, Inc. 2004

Authors and Affiliations

  • Ross Anderson
    • 1
  1. 1.Cambridge UniversityUSA

Personalised recommendations