Chapter 3 Needs for Access to Encrypted Information http://pwp.usa.pipeline.com/~jya/nrc03.txt (88 kb)