Number | Name | Date | Kind |
---|---|---|---|
4649266 | Eckert | Mar 1987 | |
5001752 | Fischer | Mar 1991 | |
5161153 | Westmore | Nov 1992 | |
5189707 | Blandford | Feb 1993 | |
5212788 | Lomet et al. | May 1993 | |
5241675 | Sheth et al. | Aug 1993 | |
5243652 | Teare et al. | Sep 1993 | |
5293627 | Kato et al. | Mar 1994 | |
5297178 | Martin | Mar 1994 | |
5334974 | Simms et al. | Aug 1994 | |
5367306 | Hollon et al. | Nov 1994 | |
5402490 | Mihm, Jr. | Mar 1995 | |
5410739 | Hart | Apr 1995 | |
5422816 | Sprague et al. | Jun 1995 | |
5440313 | Osterdock et al. | Aug 1995 | |
5467342 | Logston et al. | Nov 1995 | |
5499294 | Friedman | Mar 1996 | |
5530851 | Fortier | Jun 1996 | |
5535386 | Wang | Jul 1996 | |
5544353 | Forman et al. | Aug 1996 | |
5712916 | Windel et al. | Jan 1998 | |
5742685 | Berson et al. | Apr 1998 | |
5751809 | Davis et al. | May 1998 | |
5781630 | Huber et al. | Jul 1998 |
Number | Date | Country |
---|---|---|
0635790 | Jan 1995 | EP |
WO9203000 | Feb 1992 | WO |
WO9515522 | Jun 1995 | WO |
WO9629702 | Mar 1996 | WO |
Entry |
---|
Bruce Schneier, “Applied Cryptography: Protocols, Algorithms, and Source Code in C”, 2nd edition John Wiley and Sons, N.Y. (1995) pp. 75-79 (Timestamping Services). |