Number | Date | Country | Kind |
---|---|---|---|
5-246650 | Oct 1993 | JPX |
Number | Name | Date | Kind |
---|---|---|---|
5210860 | Pfeffer et al. | May 1993 | |
5390186 | Murata et al. | Feb 1995 | |
5459856 | Inoue | Oct 1995 | |
5463767 | Joichi et al. | Oct 1995 |
Number | Date | Country |
---|---|---|
55-53758 | Apr 1980 | JPX |
56-143054 | Nov 1981 | JPX |
58-112123 | Jul 1983 | JPX |
59-111558 | Jun 1984 | JPX |
61-62920 | Mar 1986 | JPX |
62-78623 | Apr 1987 | JPX |
62-176373 | Aug 1987 | JPX |
62-271153 | Nov 1987 | JPX |
63-37454 | Feb 1988 | JPX |
1-88677 | Apr 1989 | JPX |
1-195769 | Aug 1989 | JPX |
4-23143 | Jan 1992 | JPX |
Entry |
---|
Computer Dictionary, 2d ed., Microsoft Press (1994), at 39, 271. |
White, Fisch & Pooch, Computer System and Network Security, CRC Press (1995), at 9-10. |