Number | Name | Date | Kind |
---|---|---|---|
5022077 | Bealkowski et al. | Jun 1991 | A |
5421006 | Jablon et al. | May 1995 | A |
5692047 | McManis | Nov 1997 | A |
5734819 | Lewis | Mar 1998 | A |
5778070 | Mattison | Jul 1998 | A |
5835594 | Albrecht et al. | Nov 1998 | A |
5844986 | Davis | Dec 1998 | A |
5917421 | Saunders | Jun 1999 | A |
5919257 | Trostle | Jul 1999 | A |
5970145 | McManis | Oct 1999 | A |
Entry |
---|
Schneier, Applied Cryptology, 2e page 30.* |
Taylor, VirusCure—Virus-Proof Your PC, PC Computing, Feb. 1, 1992.* |
Arbaugh, William, A., “A Secure and Reliable Bootstrap Architecture”, www.cis.upenn.edu/was/96-35/tech-rpt.html, Dec. 1996.* |
Schneier, Bruce. Applied Cryptography: Protocols, Algorithms, and Source Code in C. Oct. 1995. p. 29.* |
Arbaugh, William et al. A Secure and Reliable Bootstrap Architecture. Dec. 1996.* |
Microsoft Press Computer Dictionary 2nd ed. Oct. 1993. p. 215. |