Cryptography Reference
In-Depth Information
Latour, Bruno. The Making of Law: An Ethnography of the Conseil d'État . Cambridge:
Polity, 2010.
Lefebvre-Teillard, Anne. Le nom: Droit et histoire . Paris: Presses universitaires de
France, 1990.
Leibowitz, Wendy. “Utah Will Repeal Its Digital Signature Law, Never Used, As Tech,
National Law Diverged.” Electronic Commerce and Law Report 10, no. 48 (December
21, 2005).
Lessig, Lawrence. Code and Other Laws of Cyberspace . New York: Basic Books, 1999.
Lessig, Lawrence. Code: Version 2.0 . New York: Basic Books, 2006.
Lessig, Lawrence. “The Law of the Horse: What Cyberlaw Might Teach.” Harvard Law
Review 113, no. 2 (1999): 501-549.
Levy, Steven. “The Cypherpunks vs. Uncle Sam.” In Building in Big Brother: The
Cryptographic Policy Debate , ed. Lance J. Hoffman, 266-283. New York: Springer,
1995.
Levy, Steven. “Clipper Chick.” Wired , September 1996: 162.
Levy, Steven. Crypto: How the Code Rebels Beat the Government, Saving Privacy in the
Digital Age . New York: Viking, 2001.
Levy, Steven. “Crypto: The Story of How a Group of Code Rebels Saved Your Privacy
on the Internet.” Newsweek, January 15, 2001: 42-52.
Levy-Bruhl, Henri. La preuve judiciaire . Paris: Librairie Marcel Rivière et Cie, 1964.
Ludlow, Peter. High Noon on the Electronic Frontier: Conceptual Issues in Cyberspace .
Cambridge, MA: MIT Press, 1996.
Lynch, Michael, Simon A. Cole, Ruth McNally, and Kathleen Jordan. Truth Machine:
The Contentious History of DNA Fingerprinting . Chicago: University of Chicago Press,
2008.
Lynch, Michael, Ruth MacNally, and Patrick Daly. “Le tribunal, fragile espace de la
preuve.” La Recherche Hors Série , no. 8 (2002): 108-113.
MacKenzie, Donald A. An Engine, Not a Camera: How Financial Models Shape Markets .
Cambridge, MA: MIT Press, 2006.
MacKenzie, Donald A. “An Equation and Its Worlds.” Social Studies of Science 33, no.
6 (2003): 831-868.
MacKenzie, Donald A. Material Markets: How Economic Agents Are Constructed . Oxford:
Oxford University Press, 2009.
MacKenzie, Donald A. Mechanizing Proof: Computing, Risk, and Trust . Cambridge, MA:
MIT Press, 2001.
Search WWH ::




Custom Search