Loading…
Encryption Served Three Ways: Disruptiveness as the Key to Exceptional Access
Saved in:
Published in: | Berkeley technology law journal 2017-01, Vol.32, p.531-562 |
---|---|
Main Author: | |
Format: | Article |
Language: | English |
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | 562 |
container_issue | |
container_start_page | 531 |
container_title | Berkeley technology law journal |
container_volume | 32 |
creator | Vandenberg, Dustin Taylor |
description | |
format | article |
fullrecord | <record><control><sourceid>jstor</sourceid><recordid>TN_cdi_jstor_primary_26490254</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><jstor_id>26490254</jstor_id><sourcerecordid>26490254</sourcerecordid><originalsourceid>FETCH-jstor_primary_264902543</originalsourceid><addsrcrecordid>eNpjYuA0MrYw0DUxNzFiYeA0NLAw0zW2MLTgYOAqLs4yMDAwMjA05mSQcc1LLqosKMnMz1MITi0qS01RCMkoSk1VCE-sLOZhYE1LzClO5YXS3Ayybq4hzh66WcUl-UXxBUWZuYlFlfFGZiaWBkamJsaE5AG_5yhm</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Encryption Served Three Ways: Disruptiveness as the Key to Exceptional Access</title><source>Nexis UK</source><source>Business Source Ultimate</source><source>JSTOR Archival Journals and Primary Sources Collection</source><creator>Vandenberg, Dustin Taylor</creator><creatorcontrib>Vandenberg, Dustin Taylor</creatorcontrib><identifier>ISSN: 1086-3818</identifier><identifier>EISSN: 2380-4742</identifier><language>eng</language><publisher>Regents of the University of California</publisher><subject>Privacy/Cyber Security</subject><ispartof>Berkeley technology law journal, 2017-01, Vol.32, p.531-562</ispartof><rights>2017 Dustin Vandenberg</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://www.jstor.org/stable/pdf/26490254$$EPDF$$P50$$Gjstor$$H</linktopdf><linktohtml>$$Uhttps://www.jstor.org/stable/26490254$$EHTML$$P50$$Gjstor$$H</linktohtml><link.rule.ids>314,780,784,58238,58471</link.rule.ids></links><search><creatorcontrib>Vandenberg, Dustin Taylor</creatorcontrib><title>Encryption Served Three Ways: Disruptiveness as the Key to Exceptional Access</title><title>Berkeley technology law journal</title><subject>Privacy/Cyber Security</subject><issn>1086-3818</issn><issn>2380-4742</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2017</creationdate><recordtype>article</recordtype><sourceid/><recordid>eNpjYuA0MrYw0DUxNzFiYeA0NLAw0zW2MLTgYOAqLs4yMDAwMjA05mSQcc1LLqosKMnMz1MITi0qS01RCMkoSk1VCE-sLOZhYE1LzClO5YXS3Ayybq4hzh66WcUl-UXxBUWZuYlFlfFGZiaWBkamJsaE5AG_5yhm</recordid><startdate>20170101</startdate><enddate>20170101</enddate><creator>Vandenberg, Dustin Taylor</creator><general>Regents of the University of California</general><scope/></search><sort><creationdate>20170101</creationdate><title>Encryption Served Three Ways</title><author>Vandenberg, Dustin Taylor</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-jstor_primary_264902543</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2017</creationdate><topic>Privacy/Cyber Security</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Vandenberg, Dustin Taylor</creatorcontrib><jtitle>Berkeley technology law journal</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Vandenberg, Dustin Taylor</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Encryption Served Three Ways: Disruptiveness as the Key to Exceptional Access</atitle><jtitle>Berkeley technology law journal</jtitle><date>2017-01-01</date><risdate>2017</risdate><volume>32</volume><spage>531</spage><epage>562</epage><pages>531-562</pages><issn>1086-3818</issn><eissn>2380-4742</eissn><pub>Regents of the University of California</pub></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1086-3818 |
ispartof | Berkeley technology law journal, 2017-01, Vol.32, p.531-562 |
issn | 1086-3818 2380-4742 |
language | eng |
recordid | cdi_jstor_primary_26490254 |
source | Nexis UK; Business Source Ultimate; JSTOR Archival Journals and Primary Sources Collection |
subjects | Privacy/Cyber Security |
title | Encryption Served Three Ways: Disruptiveness as the Key to Exceptional Access |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-08T00%3A59%3A17IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-jstor&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Encryption%20Served%20Three%20Ways:%20Disruptiveness%20as%20the%20Key%20to%20Exceptional%20Access&rft.jtitle=Berkeley%20technology%20law%20journal&rft.au=Vandenberg,%20Dustin%20Taylor&rft.date=2017-01-01&rft.volume=32&rft.spage=531&rft.epage=562&rft.pages=531-562&rft.issn=1086-3818&rft.eissn=2380-4742&rft_id=info:doi/&rft_dat=%3Cjstor%3E26490254%3C/jstor%3E%3Cgrp_id%3Ecdi_FETCH-jstor_primary_264902543%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_jstor_id=26490254&rfr_iscdi=true |