| Menezes et al, Handbook of Applied Cryptography, CRC Press, Oct. 17, 1996, pp. 387, 400-402.* |
| J. Case, M. Fedor, M. Schoffstall, and J. Davin, “A Simple Network Management Protocol (SNMP),” RFC 1157, by May 1990, 36 pages. |
| Network Working Group, G. Walters, Editor, “User-based Security Model for SNMPv2,” RFC 1910, Feb. 1996, 40 pages. |
| Ulyless Black, TCP/IP and Related Protocols, McGraw-Hill, Inc., New York, N.Y., pp. 304-310. |
| Computer Security, Time-Life Books, Inc., Richmond, Va., 1990, pp. 87-117. |
| Roger M. Needham, “The Changing Environment for Security Protocols,” IEEE Network, IEEE, New York, N.Y., vol. 11, No. 3, May/Jun. 1997, pp. 12-15. |
| Chadwick et al., “Merging and Extending the PGP and PEM Trust Models—The ICE-TEL Trust Model,” IEEE Network, IEEE, New York, N.Y., vol. 11, No. 3, May/Jun. 1997, pp. 16-24. |
| Blumenthal et al., “Key Derivation for Network Management Applications,” IEEE Network, IEEE, New York, N.Y., vol. 11, No. 3, May/Jun. 1997, pp. 26-29. |
| Michael Herfert, “Security Enhanced Mailing Lists,” IEEE Network, IEEE, New York, N.Y., vol. 11, No. 3, May/Jun. 1997, pp. 30-33. |
| Peyravian et al., “Asynchronous Transfer Mode Security,” IEEE Network, IEEE, New York, N.Y., vol. 11, No. 3, May/Jun. 1997, pp. 34-40. |
| Bruce Schneier, Applied Cryptography, Second Edition, John Wiley & Sons, 1996, pp. 5, 51, 56, 68, 210. |
| Paul J. Leach & Dilip C. Naik, “A Common Internet File System (CIFS/1.0) Protocol,” Network Working Group, Microsoft Corp., Dec. 19, 1997, pp. 1-121. |
| Fibre Channel—FAQ's Answers, Fibre Channel Association, Mountain View, CA, Mar. 18, 1998, 15 pages. |
| Fibre Channel Tutorial, Fibre Channel Association, Mountain View, CA, Mar. 7, 1998, 8 pages. |
| Zoltan Meggyesi, Fibre Channel Overview, Research Institute For Patrticles and Nuclear Physics, Budapest, Hungary, Dec. 9, 1997, 10 pages. |