Goldman, J., Internet Security, the next generation. When software encryption is not enough:, WEB Techniques, vol. 2, No. 11, Abstract Only, Nov. 1997. |
King, C., “Building a corporate public key infrastructure”, Computer Security journal, vol. 13, No. 2, abstract only, Fall 1997. |
Sameshima, Y., “Security architecture based on secret key and priviledge attribute certificates”, Distributed Platforms, Abstract Only, Mar. 1996. |
“HDTP Specification,” Unwired Planet, Inc., Version 1.1, Part No. HDTP-SPEC-DOC-101, Jul. 15, 1997, pp. 1-40. |
“HDML 2.0 Language Reference,” Unwired Planet, Inc., Version 2.0 Part No. HDMLREF-DOC-200, Revision D, Jul. 1997, pp. 1-56. |
Aziz A., et al.: Privacy and authentication For Wireless Local Area Networks a Secure Communications Protocol to Prevent Unauthorized Access: IEEE Personal Communications, US, IEEE Communications Society, vol. 1, No. 1, pp. 25-31; Jan. 1, 1994. |
Lai, M.K.F. et al.: A Mobile subscriber Proxy Preserving Writer-to Reader Message Security: Annual Military Communications Conference, US, New York, IEEE, vol. 15th pp. 461-467, 1996. |