- Privacy on the Line: The Politics of Wiretapping and Encryption. Whitfield Diffie and Susan Landau, MIT Press, 1998. According to Bruce Schneier in his Applied Cryptography, "In 1976, Whitfield Diffie and Martin Hellman changed.. cryptography forever. They described public-key cryptography." Here Diffie and co-author Landau present essays that provide historical and technical context to the cryptographic policy debate.Google Scholar
- Investing in Innovation: Creating A Research and Innovation Policy that Works, Lewis M. Branscomb, James H. Keller, editors, MIT Press, 1998. This examines current policies that strive to expand public investment in scientific research in partnership with the private sector.Google Scholar
- HAL's Legacy: 2001's Computer as Dream and Reality. David G. Stork, editor. From the publisher: "Contributions by leading scientists look at the technologies that would be critical if we were.. to try to build HAL today.."Google Scholar
- Consuming Power: A Social History of American Energies, David E. Nye MIT Press, 1997 Internet Economics, Lee W. McKnight, Joseph E Bailey, editors MIT Press, 1997Google Scholar
- Borders in Cyberspace: Information Policy and the Global Information Infrastructure, Brian Kahin and Charles Nesson, editors, MIT Press, 1997Google Scholar
- Knowing Machines: Essays on Technical Change, Donald MacKenzie MIT Press, 1996Google Scholar
- National Information Infrastructure Initiatives, Brian Kahin and Ernest Wilson, editors, MIT Press, 1997Google Scholar
- Abstracting Craft: The Practiced Digital Hand, Malcolm McCullough, MIT Press, 1997Google Scholar
- Scholarly Publishing: The Electronic Frontier, Robin P. Peek, Gregory B. Newby, editors, MIT Press, 1996Google Scholar
- Making PCR" A Story of Biotechnology, Paul Rabinow, University of Chicago Press, 1996Google Scholar
Recommendations
Review: a cognitive-affective model of organizational communication for designing IT
There are several theories available to describe how managers choose a medium for communication. However, current technology can affect not only how we communicate but also what we communicate. As a result, the issue for designers of communication ...
Logically Instantaneous Message Passing in Asynchronous Distributed Systems
Asynchrony (due to unknown message transmission delay) complicates the design of protocols for distributed systems. To simplify the protocol design task therefore, the authors propose an interprocess (point-to-point) communication mechanism that has the ...
A Message Franking Channel
Information Security and CryptologyAbstractWe pursue to formalize and instantiate a secure bidirectional channel with message franking properties. Under this model a sender may send an abusive message to the receiver and the latter wish to open it in a verifiable way to a third party. ...
Comments