Issue No. 04 - July-Aug. (2013 vol. 11)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MSP.2013.92
Daniel E. Geer , In-Q-Tel
If seizing an abandoned code base is too big a stretch for you before breakfast, then start with a certifying authority that goes bankrupt: Who gets the keys?
Encoding, Codes, keys, ownership, identity
Daniel E. Geer, "On Abandonment", IEEE Security & Privacy, vol. 11, no. , pp. 96, July-Aug. 2013, doi:10.1109/MSP.2013.92