How to Use Key Escrow (Introduction to the Special Section).
Taking Responsibility for Our Risks.
How We Profess: The Ethical Systems Analyst.
Crypto Backup and Key Escrow.
The Demographics of Candidates for Faculty Positions in Computer Science.
Programming Parallel Algorithms.
ISO 9000 Reflects the Best in Standards.
A Taxonomy for Key Escrow Encryption Systems.
A New View of Intellectual Property and Software.
Commercial Key Recovery.
The Yaksha Security System.
The Computer Scientist as a Toolsmith II.