Microsoft Press; Microsoft Corporation, Microsoft Press Computer Dictionary. 1997, 3rd Edition, pp. 129,294,302,327, and 430.* |
Microsoft Press: Computer Dictionary: 1997 Microsoft Press, Redmond, Washington. 3rd Edition, p. 294.* |
Adam, John A.; Data Security: Cyptography=Privacy?, IEEE Spectrum. Aug. 1992, New York, start p. 29.* |
Schneier, Bruce; John Wiley ? Sons, Inc., Applied Cryptography, 2nd Edition. 1996, Canada, pp. 34-41.* |
Okamoto, E.; ID-based authentication system for computer virus detection, Electronics Letters. Jul. 1990, Kawasaki, Japan, pp. 1169-1170.* |
Omura, J.K.; Novel applications of cryptography in digital communications, IEEE Communications Magazine, May 1990, Los Angeles, CA, pp. 21-29.* |
Macro Mania, Northstar Solutions.com. Copyright 1996-2002, 2 pages.* |
Commercial Add-ons, Surpac.com, 2 pages.* |
Klaming, Guenther; Download Turbo Font, Turbofnt.com. 1999, 2 pages.* |
Anonymous; Combat Macro Viruses with Digital Signatures, ZD Journals. Jan. 2000, Louisville, vol. 7, pp. 4-8. |