Search
Now showing items 1-2 of 2
The risks of key recovery, key escrow, and trusted third-party encryption
(O'Reilly & Associates, Inc, 1997-06)
A variety of "key recovery," "key escrow," and "trusted third-party" encryption requirements have been suggested in recent years by government agencies seeking to conduct covert surveillance within the changing environments ...
High Performance, Point-to-Point, Transmission Line Signaling
(Hindawi Publishing Corporation, 1998-01)
Inter-chip signaling latency and bandwidth can be key factors limiting the performance of large VLSI systems. We present a high performance, transmission line signaling scheme for point-to-point communications between VLSI ...