{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T13:48:37Z","timestamp":1742392117113},"publisher-location":"Berlin, Heidelberg","reference-count":45,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540226680"},{"type":"electronic","value":"9783540286288"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-28628-8_22","type":"book-chapter","created":{"date-parts":[[2010,9,20]],"date-time":"2010-09-20T20:54:02Z","timestamp":1285016042000},"page":"355-372","source":"Crossref","is-referenced-by-count":2,"title":["Security, Liberty, and Electronic Communications"],"prefix":"10.1007","author":[{"given":"Susan","family":"Landau","sequence":"first","affiliation":[]}],"member":"297","reference":[{"unstructured":"Administrative Office of the U.S. Courts, Washington D.C., 1995 Wiretap Report","key":"22_CR1"},{"unstructured":"Administrative Office of the U.S. Courts, Washington D.C., 2003 Wiretap Report","key":"22_CR2"},{"unstructured":"Anderson, B., Buchholz, T.: Memo for Jim Jukes. In: [16] (May 22, 1992)","key":"22_CR3"},{"unstructured":"Brandeis, L.: Dissenting opinion in Olmstead v. United States, 277 U.S. 438 (1928)","key":"22_CR4"},{"unstructured":"Brooke, J.: Prosecutors in Bomb Trial Focus on Time Span and Truck Rental. New York Times, Al\u2013A10 (May 10, 1997)","key":"22_CR5"},{"unstructured":"Brooks, J.: Telephone: the First Hundred Years. Harper and Row (1975)","key":"22_CR6"},{"unstructured":"Campbell, D.: Interception 2000: Development of Surveillance Technology and Risk of Abuse of Economic Information, Report to the Director General for Research of the European Parliament, Luxembourg (April 1999)","key":"22_CR7"},{"unstructured":"Clark, R.: (1967). In: 44, pp. 285\u2013321","key":"22_CR8"},{"unstructured":"Congressional Quarterly Weekly 1968b Congressional Quarterly Weekly, vol. 26, Washington, D.C., July 19 (1968b)","key":"22_CR9"},{"unstructured":"Dam, K., Lin, H. (eds.): Committee to Study National Cryptography Policy, Computer Science and Telecommunications Board, National Resource Council, Cryptography\u2019s Role in Securing the Information Society, National Academy Press (1996)","key":"22_CR10"},{"unstructured":"Dempsey, J.X.: Communications Privacy in the Digital Age: Revitalizing the Federal Wiretap Laws to Enhance Privacy. Albany Law Journal of Science and Technology\u00a08(1) (1997)","key":"22_CR11"},{"unstructured":"Dempsey, J.X., Cole, D.: Terrorism and the Constitution: Sacrificing Civil Liberties in the Name of National Security. In: First Amendment Foundation (1999)","key":"22_CR12"},{"key":"22_CR13","volume-title":"Privacy on the Line: The Politics of Wiretapping and Encryption","author":"W. Dime","year":"1998","unstructured":"Dime, W., Landau, S.: Privacy on the Line: The Politics of Wiretapping and Encryption. MIT Press, Cambridge (1998)"},{"unstructured":"Department of Commerce, Bureau of Export Administration: 15 CFR Parts 734, 740, 742, 770, 772, and 774, Docket No. RIN: 0694-ACll, Revisions to Encryption Items. Effective (January 14, 2000)","key":"22_CR14"},{"unstructured":"Electronic Frontier Foundation, Analysis of the FBI Proposal Regarding Digital Telephony (September 17, 1992)","key":"22_CR15"},{"unstructured":"Electronic Privacy Information Center. In: Banisar, D. (ed.) 1994 Cryptography and Privacy Sourcebook: Primary Documents on U.S. Encryption Policy, the Clipper Chip, the Digital Telephony Proposal, and Export Controls, Diane Publishing, Upland, PA (1994)","key":"22_CR16"},{"unstructured":"Electronic Privacy Information Center, 1996 EPIC Cryptography and Privacy Sourcebook: Documents on Wiretapping, Cryptography, the Clipper Chip, Key Escrow and Export Controls. Diane Publishing Co., Upland, PA (1996)","key":"22_CR17"},{"unstructured":"Federal Bureau of Investigation: Benefits and Costs of Legislation to Ensure the Government\u2019s Continued Capability to Investigate Crime with the Implementation of New Telecommunications Technologies. In: [16]","key":"22_CR18"},{"unstructured":"Letter to Telecommunications Industry Liaison Unit, Federal Bureau of Investigation. In: 17, pp. B14\u2013B20 (November 13, 1995)","key":"22_CR19"},{"unstructured":"Federal Bureau of Investigation, Implications of Section 104 of the Communications Act for Law Enforcement. Federal Register 62(9), 192-1911(January 14, 1997)","key":"22_CR20"},{"unstructured":"Federal Bureau of Investigation, In the Matter of the United States Department of Justice, the Federal Bureau of Investigation, and the Drug Enforcement Agency: Joint Petition for Rulemaking to Resolve Various Outstanding Issues Concerning the Implementation of the Communications Assistance for Law Enforcement Act: Joint Petition for Expedited Rulemaking before the Federal Communications Commission (March 10, 2004)","key":"22_CR21"},{"unstructured":"Federal Communications Commission, Memorandum Opinion and Order (September 10, 1998)","key":"22_CR22"},{"unstructured":"Firestone, D., Canedy, D.: After the Attacks: The Suspects; FBI Documents Detail the Movements of 19 Men Believed to be Hijackers. New York Times, p. Al (September 15, 2001)","key":"22_CR23"},{"unstructured":"Freeh, Louis in United States Senate, Committee on the Judiciary, Subcommittee on Technology and the Law (Senate), and United States House of Representatives, Committee on the Judiciary, Subcommittee on Civil and Constitutional Rights, Digital Telephony and Law Enforcement Access to Advanced Telecommunications Technologies and Services, Joint Hearings on HR 4922 and S. 2375, March 18-August 11 (1994), One Hundred Third Congress, Second Session","key":"22_CR24"},{"unstructured":"Hersh, S.: Annals of National Security: What Went Wrong. The New Yorker (October 8, 2001)","key":"22_CR25"},{"unstructured":"Joint Statement of Industry and Public Interest, In the Matter of Joint Petition for Rulemaking to Resolve Various Outstanding Issues Concerning the Implementation of the Communications Assistance for Law Enforcement Act (April 27, 2004)","key":"22_CR26"},{"unstructured":"Leone, R.C., Anrig Jr., G. (eds.): The War on our Freedoms: Civil Liberties in an Age of Terrorism, Century Foundation (2002)","key":"22_CR27"},{"unstructured":"Levy, R.: Memo for Doug Steiner. In: [16] (May 26, 1992)","key":"22_CR28"},{"unstructured":"Lewis, A.: Robert Kennedy Vows in Georgia to Act on Rights. New York Times, p. 1 (May 7, 1961)","key":"22_CR29"},{"unstructured":"Markoff, J.: Cellular Industry Rejects U.S. Plan for Surveillance. New York Times, p. Al (September 20, 1996)","key":"22_CR30"},{"unstructured":"Mcintosh, D., Gattuso, J.: Memo for Jim Jukes. In: [16] (May 22, 1992)","key":"22_CR31"},{"unstructured":"Neilsen\/Net Ratings, Broadband Growth Trend","key":"22_CR32"},{"unstructured":"The President\u2019s Commission on Law Enforcement and the Administration of Justice, The Challenge of Crime in a Free Society, United States Government Printing Office (1967)","key":"22_CR33"},{"unstructured":"Odlyzko, A.: Content is not King, \n                    \n                      http:\/\/www.dtc.umn.edu\/\/szraodlyzko\/doc\/networks.html","key":"22_CR34"},{"unstructured":"NWG, RFC2804 \u2014 IETF Policy on Wiretapping (May 2000)","key":"22_CR35"},{"unstructured":"Risen, J., Johnston, D., Lewis, N.A.: Harsh CIA Methods Cited in Top Qaeda Interrogations. New York Times, p. Al (May 13, 2004)","key":"22_CR36"},{"unstructured":"Rosen, J.: The Naked Crowd. Random House (2004)","key":"22_CR37"},{"unstructured":"Sessions, W.: Testimony in [43]","key":"22_CR38"},{"unstructured":"Stern, J.: Terror in the Name of God. Harper Collins Publishers (2003)","key":"22_CR39"},{"unstructured":"Technology and Privacy Advisory Committee: Department of Defense, Safeguarding Privacy in the Fight Against Terrorism (March 2004)","key":"22_CR40"},{"unstructured":"United States Commission on National Security\/Twenty-First Century, Road Map for National Security: Imperative for Change: Phase III Report of the U.S. Commission on National Security\/Twenty-First Century (January 31, 2001)","key":"22_CR41"},{"unstructured":"United States, Senate Select Committee to Study Governmental Operations with respect to Intelligence Activities, Intelligence Activities and the Rights of Americans, Final Report, Book II, Report 94-755, Ninety-fourth Congress, Second Session, April 23 (1976)","key":"22_CR42"},{"unstructured":"United States Senate, Select Committee on Intelligence, Senate Select Committe on Intelligence: Inquiry into the FBI Investigation of the Committee in Solidarity wih the People of El Salvador, Hearings on February 23, April 13, September 14 and 29 (1988), One Hundredth Congress, Second Session","key":"22_CR43"},{"unstructured":"United States House of Representatives, Committee on the Judiciary, Subcommittee No. 5, Anti-Crime Program, Hearings on HR 5037, 5038, 5384, 5385 and 5386, March 15, 16, 22, 23, April 5, 7, 10, 12, 19, 20, 26 and 27, 1967, Ninetieth Congress, First Session (1967)","key":"22_CR44"},{"unstructured":"Van Natta Jr., D., Butler, D.: How Tiny Swiss Cellphone Chips Helped Track Global Terror Web. New York Times, p. Al (March 4, 2004)","key":"22_CR45"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2013 CRYPTO 2004"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-28628-8_22.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T03:27:42Z","timestamp":1620012462000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-28628-8_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540226680","9783540286288"],"references-count":45,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-28628-8_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}