| Number | Name | Date | Kind |
|---|---|---|---|
| 5022077 | Bealkowski et al. | Jun 1991 | A |
| 5421006 | Jablon et al. | May 1995 | A |
| 5692047 | McManis | Nov 1997 | A |
| 5734819 | Lewis | Mar 1998 | A |
| 5778070 | Mattison | Jul 1998 | A |
| 5835594 | Albrecht et al. | Nov 1998 | A |
| 5844986 | Davis | Dec 1998 | A |
| 5917421 | Saunders | Jun 1999 | A |
| 5919257 | Trostle | Jul 1999 | A |
| 5970145 | McManis | Oct 1999 | A |
| Entry |
|---|
| Schneier, Applied Cryptology, 2e page 30.* |
| Taylor, VirusCure—Virus-Proof Your PC, PC Computing, Feb. 1, 1992.* |
| Arbaugh, William, A., “A Secure and Reliable Bootstrap Architecture”, www.cis.upenn.edu/was/96-35/tech-rpt.html, Dec. 1996.* |
| Schneier, Bruce. Applied Cryptography: Protocols, Algorithms, and Source Code in C. Oct. 1995. p. 29.* |
| Arbaugh, William et al. A Secure and Reliable Bootstrap Architecture. Dec. 1996.* |
| Microsoft Press Computer Dictionary 2nd ed. Oct. 1993. p. 215. |