This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
On Abandonment
July-Aug. 2013 (vol. 11 no. 4)
pp. 96
Daniel E. Geer, In-Q-Tel
If seizing an abandoned code base is too big a stretch for you before breakfast, then start with a certifying authority that goes bankrupt: Who gets the keys?
Index Terms:
Encoding,Codes,keys,ownership,identity
Citation:
Daniel E. Geer , "On Abandonment," IEEE Security & Privacy, vol. 11, no. 4, pp. 96, July-Aug. 2013, doi:10.1109/MSP.2013.92
Usage of this product signifies your acceptance of the Terms of Use.