Key disclosure law (English Wikipedia)

Analysis of information sources in references of the Wikipedia article "Key disclosure law" in English language version.

refsWebsite
Global rank English rank
1st place
1st place
14th place
14th place
388th place
265th place
427th place
1,174th place
1,216th place
797th place
4,491st place
2,855th place
2,584th place
1,811th place
6,834th place
4,564th place
low place
low place
low place
low place
low place
low place
low place
6,954th place
1,502nd place
1,862nd place
low place
6,257th place
low place
low place
low place
low place
1,210th place
1,422nd place
1,712th place
1,063rd place
1,028th place
740th place
6,607th place
3,855th place
985th place
583rd place
5,594th place
low place
low place
low place
3,070th place
5,496th place
265th place
1,095th place
70th place
63rd place
low place
low place
low place
low place
low place
low place
2,753rd place
1,655th place
457th place
272nd place
7th place
7th place
377th place
1,147th place
low place
low place
low place
low place
low place
low place
3,288th place
4,712th place
34th place
27th place
8th place
10th place
175th place
137th place
12th place
11th place
49th place
47th place
36th place
33rd place
low place
low place
low place
low place
272nd place
225th place
193rd place
152nd place
1,697th place
1,040th place
3,285th place
2,156th place
low place
8,773rd place
415th place
327th place

161.86

220.227.161.86

archive.today

arstechnica.com

bbc.co.uk

news.bbc.co.uk

boe.es

canada.ca

canlii.org

cnet.com

comlaw.gov.au

coreyvarma.com

dataguidance.com

datainspektionen.se

efa.org.au

eff.org

epravo.cz

fgov.be

ejustice.just.fgov.be

finlex.fi

freeotfe.org

fsu.edu

cs.fsu.edu

  • Desmedt, Yvo and Burmester, Mike and Seberry, Jennifer. Equitability in Retroactive Data Confiscation versus Proactive Key Escrow. Florida State University Department of Computer Science 206 Love Building FL 32306-4530 Tallahassee USA. Lecture Notes in Computer Science: Public Key Cryptography, pp.277-286. 2001. (Postscript), (Postscript 2) Archived 2017-08-30 at the Wayback Machine

globalnews.ca

gov.ag

laws.gov.ag

gov.kh

ocm.gov.kh

gp-digital.org

icai.org

independent.co.uk

irishstatutebook.ie

  • (eISB), electronic Irish Statute Book. "Search warrant". www.irishstatutebook.ie. Retrieved 2018-03-23.

lavanguardia.com

legifrance.gouv.fr

lexology.com

loc.gov

mit.edu

dspace.mit.edu

mvcr.cz

nytimes.com

ohchr.org

cambodia.ohchr.org

overheid.nl

wetten.overheid.nl

pondicherry.gov.in

police.pondicherry.gov.in

publikt.se

reuters.com

uk.reuters.com

scholar.google.com

  • Commonwealth v. Gelfgatt (Report). Vol. 468. Supreme Judicial Court of Massachusetts. June 25, 2014. p. 512. Retrieved October 19, 2014.

sophos.com

nakedsecurity.sophos.com

stuff.co.nz

techrepublic.com

  • Ranger, Steve (24 March 2015). "The undercover war on your internet secrets: How online surveillance cracked our trust in the web". TechRepublic. Archived from the original on 2016-06-12. Retrieved 2016-06-12.

thecanadianencyclopedia.ca

  • Singh Case. The Canadian Encyclopedia. Last modified 2017 August 6. Retrieved 2018 January 29.

theguardian.com

theregister.co.uk

uow.edu.au

  • Desmedt, Yvo and Burmester, Mike and Seberry, Jennifer. Equitability in Retroactive Data Confiscation versus Proactive Key Escrow. Florida State University Department of Computer Science 206 Love Building FL 32306-4530 Tallahassee USA. Lecture Notes in Computer Science: Public Key Cryptography, pp.277-286. 2001. (Postscript), (Postscript 2) Archived 2017-08-30 at the Wayback Machine

vice.com

motherboard.vice.com

volokh.com

washingtonpost.com

web.archive.org

  • Ranger, Steve (24 March 2015). "The undercover war on your internet secrets: How online surveillance cracked our trust in the web". TechRepublic. Archived from the original on 2016-06-12. Retrieved 2016-06-12.
  • Desmedt, Yvo and Burmester, Mike and Seberry, Jennifer. Equitability in Retroactive Data Confiscation versus Proactive Key Escrow. Florida State University Department of Computer Science 206 Love Building FL 32306-4530 Tallahassee USA. Lecture Notes in Computer Science: Public Key Cryptography, pp.277-286. 2001. (Postscript), (Postscript 2) Archived 2017-08-30 at the Wayback Machine
  • "Antigua and Barbuda: The Computer Misuse Bill, 2006" (PDF). Archived from the original (PDF) on 2011-07-06. Retrieved 2010-11-09.
  • Loi du 28 novembre 2000 relative à la criminalité informatique: Article 9. 2000 November 28. Retrieved 2010 November 9. (The investigating judge may order any appropriate person to put the computer system into operation himself or, as the case may be, to search for, make available, copy, render inaccessible or remove the relevant data stored, processed or transmitted by that system, in the form he has requested. Such persons shall be obliged to comply with such requests to the extent of their ability.)
  • Paper – 6 : Information Systems Control and Audit Archived 2012-07-11 at the Wayback Machine (PDF) 10 pp. 42–3. Study Material - Final (New) The Institute of Chartered Accountants of India.
  • "Remiss av betänkandet Europarådets konvention om it - relaterad brottslighet (SOU 2013:39)" (PDF) (in Swedish). Archived from the original (PDF) on 2014-05-22.
  • "In re Grand Jury Subpoena to Sebastien Boucher, Memorandum of Decision" (PDF). The Volokh Conspiracy. February 19, 2009. Archived from the original (PDF) on July 16, 2014. Retrieved 2009-08-29.

wired.com