Keywords
- National Security
- Internet Protocol
- Federal Communication Commission
- Advance Encryption Standard
- Internet Engineer Task Force
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Susan Landau, “Security, Wiretapping, and the Internet,” IEEE Security & Privacy, Copyright ©2006, IEEE, Inc. All rights reserved. IEEE, Inc., IEEE Corporate Office, 3 Park Avenue, 17th Floor, New York, New York, 10016–5997 U.S.A., vol. 3, no. 6, November/December 2005, pp. 26–33.
John R. Vacca, Satellite Encryption, Academic Press, Jul 1999.
Rights and permissions
Copyright information
© 2007 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
(2007). Countering or not Countering the Eavesdropper: That’s the Question?. In: Practical Internet Security. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-29844-3_15
Download citation
DOI: https://doi.org/10.1007/978-0-387-29844-3_15
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-40533-9
Online ISBN: 978-0-387-29844-3
eBook Packages: Computer ScienceComputer Science (R0)
