R.E. Lennon, et al., IBM Technical Disclosure Bulletin, “Application For Personal Key Crypto With Insecure Terminals”, vol. 24, No. 1B, pp. 561-565 (Jun. 1981). |
D. Chaum, “Security Without Identification: Transaction Systems To Make Big Brother Obsolete”, Communications of the ACM, vol. 28, No. 10, pp. 1030-1044 (Oct. 1985). |
D.M. Nessett, “Layering Central Authentication on Existing Distributed System Terminal Services”, Proceedings 1989 IEEE Computer Society Symposium on Security and Privacy, pp. 290-299 (May 1-3 1989). |
S. Russell, “Paradigms For Verification Of Authorization At Source Of Electronic Documents In An Integrated Environment”, Eighth Annual Computer Security Applications Conference, IEEE Computer Society Press, pp. 203-209 (Nov. 30-Dec. 4, 1992). |
H. T. Jung, et al., “Caller Identification System In The Internet Environment”, UNIX Security Symposium IV, pp. 69-78 (Oct. 4-6, 1993). |
R. Molva, et al., “Authentication Method With Impersonal Token Cards”, IEEE, pp. 56-65 (1993). |
S. Russell, “Transparent Cosignatures For Electronic Documents”, IEEE Proceedings Ninth Annual Computer Security Applications Conference, pp. 82-91 (Dec. 6-10, 1993). |
V. Bharghavan, “Secure Wireless LANs”, 2nd ACM Conference On Computer And Communications Security, pp. 10-17 (Nov. 2-4, 1994). |
R. Kailar, “Reasoning About Accountability In Protocols For Electronic Commerce”, 1995 IEEE Symposium on Security and Privacy, pp. 236-250 (May 8-10, 1995). |
M. Jakobsson, et al., “Revokable and Versatile Electronic Money”, 3rd ACM Conference on Computer and Communications Security, pp. 76-87 (Mar. 14-16, 1996). |
C. Serban, et al., “Run-Time Security Evaluation (RTSE) for Distributed Applications”, Proceedings 1996 IEEE Symposium on Security and Privacy, pp. 222-232 (May 6-8, 1996). |
B. Askwith, et al., “Achieving User Privacy In Mobile Networks”, IEEE Thirteenth Annual Computer Security Applications Conference, pp. 108-116 (Dec. 8-12, 1997). |
M. Naor, “Certificate Revocation and Certificate Update”, Seventh USENIX Security Symposium Proceedings, pp. 217-228 (Jan. 26-29, 1998). |
P. T. Devanbu, et al., “Techniques for Trusted Software Engineering”, Proceedings Forging New Links 20th International Conference on Software Engineering, IEEE Computer Society, pp. 126-135 (Apr. 19-25, 1998). |