Volume 7, Issue 2 Cryptographic imaginaries and the networked public Sarah Myers West, University of Southern California PUBLISHED ON: 15 May 2018 DOI: 10.14763/2018.2.792 This paper examines three historical imaginaries associated with encryption, considering how they are intertwined in contemporary policy debates. KEYWORDS: Encryption, Privacy, Security, History, Information control
Cyber warfare A hawkish call to cyber arms Monika Ermert, Heise, Intellectual Property Watch, VDI-Nachrichten PUBLISHED ON: 9 Feb 2015 Monika Ermert reports from the Munich Security Conference, where experts ponder over hybrid and cyber war.