Table of contents
-
1. Introduction
-
2. Cryptography and its complexity
-
3. Legal framework on cryptography: international law and public order
-
4. Encryption, biometrics and data protection in mobile devices
-
5. Conclusion
-
6. References