Addison, K.P., et al., “Secure Networking at Sun Microsystems, Inc.,” National Computer Security Conference, Oct. 17-20, 1988, 212-218. |
Branstad, D., et al., “SP4: A Transport Encapsulation Security Protocol,” A Collection of Technical Papers: AIAA/ASIS/IEEE Third Aerospace Computer Security Conference: Applying Technology to Systems, Orlando, Florida, Dec. 7-11, 1987, 143-147. |
Cain, R., et al., “12000 BPS Telephone Modem for Digital Voice Security,” 1985 Carnahan Conference on Security Technology, May 15-17, 1985, 25-28. |
Cox, R.V., “The Analog Voice Privacy System,” AT&T Technical Journal, 1987, 66(1), 119-131. |
Cox, R.V., et al., “The Analog Voice Privacy System,” ICASSP 86 Proceedings, Tokyo, Japan, IEEE, Apr. 7-11, 1986, vol. 1 of 4, 341-344. |
Cramer, R., et al., “Design and Implementation of a Secure Terminal Gateway,” Fourth Aerospace Computer Security Applications Conference, IEEE, 1988, 262-268. |
Herbison, B.J., “Security on an Ethernet,” 11th National Computer Security Conference, Oct. 17-20, 1988, 219-225. |
Jo, K.Y., et al., “Interconnection of Heterogeneous Defense Data Networks,” Conference Record, IEEE Military Communications Conference, Oct. 15-18, 1989, 0810-0816. |
Lindell, K., “Audio Scrambling System,” Radio-Electronics, 1988, 51-77. |
Linn, J., “Comsec Integration Alternatives,” 11th National Computer Security Conference, Oct. 17-20, 1988, 122-125. |
Matsunaga, A., et al., “An Analog Speech Scrambling System Using the FFT Technique with High-Level Security,” IEEE Journal on Selected Areas in Communications, 1989, 7(4), 540-546, 547. |
Nelson, R., “End-to-End Encryption at the Network Layer,” 5th Annual Computer Security Applications Conference, IEEE Computer Society Press, Dec. 4-8, 1989, p. 28. |
Schell, R.R., et al., “A Network of Trusted Systems,” A Collection of Technical Papers, AIAA/ASIS/IEEE Third Aerospace Computer Security Conference: Applying Technology to Systems, Dec. 7-11, 1987, 140-142. |
Schnackenberg, D.D., “Development of a Multilevel Secure Local Area Network,” Reprinted from Proceedings of the 8th National Computer Security Conference, 1985, 403-410. |
Steer, D.G., et al., “A Secure Audio Teleconference System,” Conference Record vol. 1 of 3, IEEE Military Communications Conference, MILCOM88, Oct. 23-26, 1988, 0063-0067. |
Sundareshan, M.K., et al., “Design and Deployment of an Integrated Data Ciphering Unit Inside a Low Bit Rate Voice Transcoder for Secure Voice Communications Over Telephone Networks,” BOSTONICC/89, World Prosperity Through Communications, IEEE, Jun. 11-14, 1989, 1149-1153. |
Tirenin, et al., “Enhanced Multinet Gateway: Survivable Multi-Level Secure Data Communications,” MILCOM91, Conference Record, vol. 2 or 3, Military Communications in a Changing World, IEEE, 1991, 0740-0744. |
Williamson, J. (ed.), Jane's Military Communications, 11th Edition, Encryption & Security, 1990-1991, 541-543. |
Williamson, J. (ed.), Jane's Military Communications, 12th Edition, Encryption & Security, 1991-1992, 499-501, 506. |
“Telephone and voice recording,” All Telephone and Voice Recordering Products (p. 2 or 4), http://www.force-ten.com/forceten/tele_recorders2.htm, May 1, 2000, 1 page. |
“Quick Tap telephone handset tap,” http://www.jkaudio.com/products/product3.htm, May 1, 2000, 1 page. |
“That-1 telephone handset audio tap,” http://www.jkaudio.com/product11.htm, May 1, 2000, 2 pages. |
“That-2 telephone handset audio tap,” http://www.jkaudio.com/products/product12.htm, May 1, 2000, 2 pages. |
“Telephone amplifiers, in-line amplifier (HA-25),” GIF image 200x183 pixels, wysiwyg://167/http://business.fortunecity.com/moo/256/page8.htm, May 1, 2000, 3 pages. |
“Phone receiver amplifier and portable telephone amplifier,” Telephone Aides, http://supply.medicaledge.com/page22.htm, May 1, 2000, 1 page. |
“SecurePhone™,” Information Security Corporation, http://www.infoseccorp.com/products/securephone.htm, May 2, 2000, 2 pages. |
“The voice changer II,” http://www.clever.net/security/voic.htm, May 2, 2000, 1 page. |
“Talk link voice changer,” Spy Supply Online: Phone Security, http://www.spysupplyonline.com/phonesec.html, May 1, 2000, 1 page. |
“LX40™ series telephone scrambler,” LX40 Series, http://www.transcrypt.com/Pages/Telephony/lx40.html, May 2, 2000, 2 pages. |
“DME series landline encryptor,” DME Series, http://www.transcrypt.com/Pages/Telephony/dme.html, May 2, 2000, 4 pages. |
“CSD 3600,” Secure encrypted telephone and cellular solutions by TCC, http://135.145.192.160/csd3600.htm, May 2, 2000, 3 pages. |
“For your ears only: inexpensive telephone encryption arrives,” Leadership Defined, wysiwig://one.41/http://www.comput. . . frames, May 9, 2000, 2 pages. |