“PTO's Enterprise Wide Login User's Guide” Version 1.0 p. 1-8, Jun. 1999.* |
Neuman et al, “Kerberos: An Authentication Service for Computer Networks” Sep. 1994, IEEE Communications Magazine, p. 33-38.* |
Schneier, “Applied Cryptography” 1996, John Wiley & Sons, Inc., 2nd Edition, p. 566-572.* |
“Identix Introduces the First Authenticated Certificate- The Next Level of Identity Protection for Internet Security and Secure E-Business”, Company Press Release, http://biz.yahoo.com/bw/991116/nv_identix_1.html, 3 pgs, Nov. 16, 1999. |
Wahab et al, “Biometrics Electronic Purse” 1999, IEEE, p. 958-961.* |
Lampson, “Computer Security”, Digital Equipment Corporation, p. 1-54. |