| Bacon et al., "Copier Security System" IBM Tech. Disc. Bulletin, vol. 18, No. 6, Nov. 1975, pp. 1747-1748. |
| Boggs and Ernst, "Copier Incorporating Document Detection System," IBM Tech. Disclosure Bull., vol. 15, No. 7, Dec. 1972. |
| Marinace, "Copier System for Confidential Papers," IBM Tech. Disc. Bull., vol. 15, No. 17, Dec. 1972. |
| Boggs and Ernst, "Unauthorized Copy Prevention," IBM Tech. Disc. Bull., vol. 15, No. 12, May 1973. |
| Boggs and Woodward, "Gradiometer Document Detector for Copy Security," IBM Tech. Disc. Bull., vol. 16, No. 6, Nov. 1973. |
| Harr et al., "`No-Copy` Attachment for Copier," IBM Tech. Disc. Bull., vol. 17, No. 11, Apr. 1975. |
| Bacon, "Secure Document Feature for Copy Machines," IBM Tech. Disc. Bull., vol. 17, No. 11, Apr. 1975. |
| Simpson, "Copier Document Security," IBM Tech. Disc. Bull., vol. 17, No. 11, Apr. 1975. |
| Weinberg, "Document Copying Inhibitor Method," IBM Tech. Disc. Bull., vol. 17, No. 12, May 1975. |
| Bruce, "Unauthorized Copy Prevention," IBM Tech. Disc. Bull., vol. 18, No. 1, Jun. 1975. |
| Galli and Melz, "Copier Security System," IBM Tech. Disc. Bull., vol. 18, No. 3, Aug. 1975. |
| Bacon and Hildenbrandt, "Secure Document Feature for Copy Machines," IBM Tech. Disc. Bull., vol. 18, No. 4, Sep. 1975. |
| Queener, "Document Copy Prevention," IBM Tech. Disc. Bull., vol. 18, No. 6, Nov. 1975. |
| Guido, "Preventing Copying of Classified Information," IBM Tech. Disc. Bull., vol. 19, No. 4, Sep. 1976. |
| Hildenbrandt, "Document Security for Copiers," IBM Tech. Disc. Bull., vol. 19, No. 9, Feb. 1977. |