Bacon et al., "Copier Security System" IBM Tech. Disc. Bulletin, vol. 18, No. 6, Nov. 1975, pp. 1747-1748. |
Boggs and Ernst, "Copier Incorporating Document Detection System," IBM Tech. Disclosure Bull., vol. 15, No. 7, Dec. 1972. |
Marinace, "Copier System for Confidential Papers," IBM Tech. Disc. Bull., vol. 15, No. 17, Dec. 1972. |
Boggs and Ernst, "Unauthorized Copy Prevention," IBM Tech. Disc. Bull., vol. 15, No. 12, May 1973. |
Boggs and Woodward, "Gradiometer Document Detector for Copy Security," IBM Tech. Disc. Bull., vol. 16, No. 6, Nov. 1973. |
Harr et al., "`No-Copy` Attachment for Copier," IBM Tech. Disc. Bull., vol. 17, No. 11, Apr. 1975. |
Bacon, "Secure Document Feature for Copy Machines," IBM Tech. Disc. Bull., vol. 17, No. 11, Apr. 1975. |
Simpson, "Copier Document Security," IBM Tech. Disc. Bull., vol. 17, No. 11, Apr. 1975. |
Weinberg, "Document Copying Inhibitor Method," IBM Tech. Disc. Bull., vol. 17, No. 12, May 1975. |
Bruce, "Unauthorized Copy Prevention," IBM Tech. Disc. Bull., vol. 18, No. 1, Jun. 1975. |
Galli and Melz, "Copier Security System," IBM Tech. Disc. Bull., vol. 18, No. 3, Aug. 1975. |
Bacon and Hildenbrandt, "Secure Document Feature for Copy Machines," IBM Tech. Disc. Bull., vol. 18, No. 4, Sep. 1975. |
Queener, "Document Copy Prevention," IBM Tech. Disc. Bull., vol. 18, No. 6, Nov. 1975. |
Guido, "Preventing Copying of Classified Information," IBM Tech. Disc. Bull., vol. 19, No. 4, Sep. 1976. |
Hildenbrandt, "Document Security for Copiers," IBM Tech. Disc. Bull., vol. 19, No. 9, Feb. 1977. |