Issue No.04 - July-Aug. (2013 vol.11)
Daniel E. Geer , In-Q-Tel
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MSP.2013.92
If seizing an abandoned code base is too big a stretch for you before breakfast, then start with a certifying authority that goes bankrupt: Who gets the keys?
Encoding, Codes, keys, ownership, identity
Daniel E. Geer, "On Abandonment", IEEE Security & Privacy, vol.11, no. 4, pp. 96, July-Aug. 2013, doi:10.1109/MSP.2013.92