Microsoft Corporation, Computer Dictionary, 2002, Fifth Edition, p. 484.* |
“Mechanics of the Common Security Services Manager (CSSM)”, Rajan and Wood, Intel Corporation 1999, pp. 1-17. |
“Making PC Interaction Trustworthy for Communications, Commerce and Content”, Intel Security Program, Jul. 1998, pp. 1-6. |
“Security Prevails in e-mail coding”, pp. 1-2. |
“Secure Way Cryptographic Infrastructure”, IBM 1996, pp. 1-3. |
“Supporting Services and Sub-Systems”, IBM 1996, pp. 1-4. |
“APIs and Toolkits”, IBM 1996, pp. 1-2. |
“Cryptographic Engines”, IBM 1996, pp. 1-2. |
“The IBM Secure Way Cryptographic Infrastructure”, IBM 1996, pp. 1-2. |
“Applications”, IBM 1996, pp. 1-2. |
“Conclusion”, IBM 1996, pp. 1-3. |
“High-Tech Leader Join Forces to Enable International Strong Encryption”, IBM 1996, pp. 1-3. |
“Gore to Unveil Encryption Policy”, The Net 1996, pp. 1-2. |
“White House Encryption Initiative-2: IBM, Digital Support”, Dow Jones International News, Oct. 1, 1996, pp. 1-3. |
“IBM (International Business Machines Corp) to Form Consotium for Data Encryption”, Yahoo, Oct. 1, 1996, pp. 1-2. |
“Method for Ensuring Integrity of Public Key Algorithm Public and Private Keys and for Coupling the usage of a Key to the Correct Specification of the key's Associated Control Vector”, SPI Database of Software Technologies, Jun. 1994, 1 page. |
“Solaris Manpage for Intro(1M)(maintenance Commands)”, SPI Database of Software Technologies, 1993, pp. 4-7. |
“SunOS Manpage for INTRO(4)”, SPI Database of Software Technologies, Apr. 29, 1992, pp. 14-15. |
“SunOS Manpage for INTRO(8)”, SPI Database of Software Technologies, May 22, 1991, pp. 7-11. |
Two-Level Data Security System for an IBM Personal Computer; SPI Database of Software Technologies, Mar. 1987, pp. 11-12. |
“Statement of the Vice President”, The White House, Oct. 1, 1996, pp. 1-3. |
“Hardware Contention Serialization Algorithm”, IBM Technical Disclosure Bulletin, vol. 38, Issue No. 4, Apr. 1995, 73-78. |
“Telecommunication Software and Multimedia ISSN”, 1455-9749, Article in T-110.501 Seminar on Network Security, 2001ISBN 951-22-5807-2. |
Cheng, et al., “Trusting DRMSoftware”, W3C workshop on DRM, Jan. 2001. |