What Should be Hidden and Open in Computer Security?: Revision history

Jump to navigation Jump to search

Diff selection: Mark the radio buttons of the revisions to compare and hit enter or the button at the bottom.
Legend: (cur) = difference with latest revision, (prev) = difference with preceding revision, m = minor edit.

24 December 2023

  • curprev 03:0303:03, 24 December 2023SatoshiNakamoto talk contribs 1,976 bytes +1,976 Created page with "Title: What Should be Hidden and Open in Computer Security? Research Question: How can we determine the optimal level of openness and secrecy in computer security to ensure both security and interoperability? Methodology: The researcher uses a combination of legal, economic, and military theories to analyze the issue of what should be hidden and what should be open in computer security. They draw on their personal experience as a government official involved in encrypt..."