- From: Keith Moore <moore@cs.utk.edu>
- Date: Thu, 29 Jul 1999 10:36:22 -0400
- To: Jacob Palme <jpalme@dsv.su.se>
- cc: discuss@apps.ietf.org
> We might develop solutions which are both technially sound and > acceptable to the export control people. For example, we might use > different algorithms for encryption of content, than for the > encryption used in identification and authorization services. what makes you think that this approach is technically sound?
Received on Thursday, 29 July 1999 10:39:50 UTC