The risks of key recovery, key escrow, and trusted third-party encryption.
Hal AbelsonRoss J. AndersonSteven M. BellovinJosh BenalohMatt BlazeWhitfield DiffieJohn GilmorePeter G. NeumannRonald L. RivestJeffrey I. SchillerBruce SchneierPublished in: World Wide Web J. (1997)