Content deleted Content added
→Sources: added source |
→Sources: added source |
||
Line 90:
* {{cite book | last=Diffie | first=Whitfield | last2=Landau | first2=Susan | title=The History of Information Security | chapter=The export of cryptography in the 20th and the 21st centuries | publisher=Elsevier | pages = 725–736 | year=2007 | doi=10.1016/b978-044451608-4/50027-4}}
* {{cite journal | last=Murphy | first=Cian C | title=The Crypto-Wars myth: The reality of state access to encrypted communications | journal=Common Law World Review | publisher=SAGE Publications | volume=49 | issue=3-4 | year=2020 | issn=1473-7795 | doi=10.1177/1473779520980556 | pages=245–261 | url = https://journals.sagepub.com/doi/10.1177/1473779520980556 }}
* {{cite journal | last=Riebe | first=Thea | last2=Kühn | first2=Philipp | last3=Imperatori | first3=Philipp | last4=Reuter | first4=Christian | title=U.S. Security Policy: The Dual-Use Regulation of Cryptography and its Effects on Surveillance | journal=European Journal for Security Research | publisher=Springer Science and Business Media LLC | volume=7 | issue=1 | date=2022-02-26 | issn=2365-0931 | doi=10.1007/s41125-022-00080-0 | pages=39–65 | url = https://link.springer.com/content/pdf/10.1007/s41125-022-00080-0.pdf?pdf=button}}
==See also==
|