[3286] in cryptography@c2.net mail archive
RE: "Internet Cryptography" Special Session at NISSC
daemon@ATHENA.MIT.EDU (Gregory Perry)
Mon Sep 14 21:16:23 1998
Reply-To: <Gregory.Perry@netsec.net>
From: "Gregory Perry" <Gregory.Perry@netsec.net>
To: "Jim Gillogly" <jim@acm.org>, <cryptography@c2.net>
Date: Mon, 14 Sep 1998 20:47:17 -0400
In-Reply-To: <35FD96C8.C0E3EC53@acm.org>
Secure Computing makes no bones about the fact that it loves the =
military and government cash cow, hence their need to constantly modify =
the SCTC product line according to the latest government trends (escrow, =
GAK, recovery etc.).
> -----Original Message-----
> From: owner-cryptography@c2.net [mailto:owner-cryptography@c2.net]On
> Behalf Of Jim Gillogly
> Sent: Monday, September 14, 1998 6:21 PM
> To: cryptography@c2.net
> Subject: Re: "Internet Cryptography" Special Session at NISSC
>=20
>=20
> Rick Smith <rick_smith@securecomputing.com> writes:
> >This is to announce a special session at the National Information =
Systems
> >Security Conference (NISSC) next month in Crystal City, VA. I'm =
sending
> >this e-mail because the session is not listed in the preliminary =
program.
> >
> >Title: Internet Cryptography
> >Presented by Richard E. Smith, Secure Computing Corporation
> >Tuesday October 6, 1:30 to 5:00 pm
>=20
> Will this presentation be describing Secure Computing's IETF draft =
that
> proposes to put "key recovery" extensions into IPsec, the draft =
Internet
> IP-level security standard? This is draft-rfced-exp-markham-00.txt, =
for
> you viewers at home, and it's certainly the first thing <I> think of
> when I see "Secure Computing" and "Internet Cryptography" in the same
> paragraph.
>=20
> --=20
> Jim Gillogly
> Highday, 23 Halimath S.R. 1998, 22:09
> 12.19.5.9.6, 3 Cimi 19 Mol, Sixth Lord of Night
>=20