This is the old version of the H2O platform and is now read-only. This means you can view content but cannot create content. You can access the new platform at https://opencasebook.org. Thank you.
Edit playlist item notes below to have a mix of public & private notes, or:MAKE ALL NOTES PUBLIC (3/3 playlist item notes are public) MAKE ALL NOTES PRIVATE (0/3 playlist item notes are private)
|1||Show/Hide More||Steven Levy, Crypto Ch. 3: Public Key, 2001|
|2||Show/Hide More||Introduction to Public-Key Cryptography, Mozilla Developer Network, 2005|
|3||Show/Hide More||D. Richard Kuhn et al., Introduction to Public Key Technology and the Federal PKI Infrastructure, NIST, 2001|
May 21, 2013
Jack Goldsmith and a Berkman Center Cybersecurity Team
This is the old version of the H2O platform and is now read-only. This means you can view content but cannot create content. If you would like access to the new version of the H2O platform and have not already been contacted by a member of our team, please contact us at firstname.lastname@example.org. Thank you.