Number | Name | Date | Kind |
---|---|---|---|
4500880 | Gomersall et al. | Feb 1985 | |
4660221 | Dlugos | Apr 1987 | |
4678896 | Carlson et al. | Jul 1987 | |
4720860 | Weiss | Jan 1988 | |
4900904 | Wright et al. | Feb 1990 | |
4951308 | Bishop et al. | Aug 1990 | |
4962531 | Sipman et al. | Oct 1990 | |
5027401 | Soltesz | Jun 1991 | |
5056141 | Dyke | Oct 1991 | |
5146499 | Geffrotin | Sep 1992 | |
5149945 | Johnson et al. | Sep 1992 | |
5153842 | Dlugos et al. | Oct 1992 | |
5163098 | Dahbura | Nov 1992 | |
5177789 | Covert | Jan 1993 | |
5191611 | Lang | Mar 1993 | |
5193114 | Moseley | Mar 1993 | |
5202921 | Herzberg et al. | Apr 1993 | |
5204663 | Lee | Apr 1993 | |
5233658 | Bianco et al. | Aug 1993 |
Entry |
---|
"The 60 Second Password, Secure Computer Access; Security Dynamics"; 15 Dwight St, Boston, Mass., 1 page; 1984. |
S. M. Matyas and C. H. Meyer "Cryptography: a New Dimension in Computer Data Security; a Guide for the Design and Implementation", Wiley, 1982, Table of Contents attached--also Chapter Three `The Data Encryption Standard` pp. 113-191. |
J. Millman and H. Taub "Pulse and Digital Circuits", McGraw-Hill Book Company, Inc., 1956--Table of Contents attached--also Chapter 13-10 Registers, pp. 411-412. |