Bruce Schneier, Applied Cryptography, pages 38, 193-194.* |
Rivest et al., “A Method for Obtaining Digitial Signatures and Public-Key Cryptosystems”, 1978, Communications of the ACM, vol. 21, No. 2. |
“PKCS #1: RSA Encryption Standard”, Nov. 1, 1993, RSA Laboratories Technical Note, Version 1.5. |
Schmidt, M., C T Magazin Fuer Computer Technik, 8:226-230, 232-35, Apr. 14, 1998, “Unter Ausschuss der Oeffentlichkeit Virtual Private Networks—Vertraulicher Datenaustausch Ueber das Internet.”. |
“Unter Ausschuss der Oeffentlichkeit Virtual Private Networks—Vertraulicher Datenaustausch Ueber das Internet.” . |
Wunnava, S. V., et al., Proceedings of IEEE Southeaston '96: Bringing Together Education, Science and Technology, pp. 107-110, 1996, “Advances in Virtual Design & Virtual Center Concept.”. |
“Advances in Virtual Design & Virtual Center Concepts.”. |
de Albuquerque, M. P., et al., Nuclear Instruments& Methods in Physics Research, Section A: Accelerators, Spectrometers, Detectors and Associated Equipment, 412(1):140-145, 1998, “Remote Monitoring Over the Internet.”. |
Gabel, J., Elektrotechnische Zeitschrift E.T.Z.,105(20):1088-1091, 1984, “Ubermittlung von Fernwirkinformationen mit Temex.”. |