This application is a file wrapper continuation of application Ser. No. 08/482,013 filed Jun. 7, 1995.
Number | Name | Date | Kind |
---|---|---|---|
4200770 | Hellman et al. | Apr 1980 | |
4218582 | Hellman et al. | Aug 1980 | |
4264782 | Konheim | Apr 1981 | |
4351982 | Miller et al. | Sep 1982 | |
4424414 | Hellman et al. | Jan 1984 | |
4567600 | Massey et al. | Jan 1986 | |
4590470 | Koenig | May 1986 | |
4723284 | Munck et al. | Feb 1988 | |
4779224 | Moseley et al. | Oct 1988 | |
4964164 | Fiat | Oct 1990 | |
5371794 | Diffie et al. | Dec 1994 | |
5428745 | de Bruijn et al. | Jun 1995 | |
5491752 | Kaufman et al. | Feb 1996 |
Entry |
---|
A User Authentication Scheme Not Requiring Secrecy In The Computer, Operating Systems, Communications of the ACM, Aug., 1974, vol. 17, No. 8, Authors: Arthur Evans, Jr., et al. |
Privacy And Authentication: An Introduction To Cryptography, Authors: Whitfield Diffie and Martin E. Hellman. |
Password Security: A Case History, Operating Systems, Communications of the ACM, Nov., 1979, vol. 22, No. 11, Authors: Robert Morris, et al. |
A High Security Log-In Procedure, Operating Systems, Communications of the ACM, Aug., 1974, vol. 17, No. 8, Authors: George B. Purdy. |
Number | Date | Country | |
---|---|---|---|
Parent | 482013 | Jun 1995 |