| Number | Name | Date | Kind |
|---|---|---|---|
| 5442749 | Northcutt et al. | Aug 1995 | A |
| 5761309 | Ohashi et al. | Jun 1998 | A |
| 5774551 | Wu et al. | Jun 1998 | A |
| 5841970 | Tabuki | Nov 1998 | A |
| 5845070 | Ikudome | Dec 1998 | A |
| 5944824 | He | Aug 1999 | A |
| 6006328 | Drake | Dec 1999 | A |
| 6023684 | Pearson | Feb 2000 | A |
| 6073242 | Hardy et al. | Jun 2000 | A |
| 6173400 | Perlman et al. | Jan 2001 | B1 |
| 6219790 | Lloyd et al. | Apr 2001 | B1 |
| 6223289 | Wall et al. | Apr 2001 | B1 |
| 6226744 | Murphy et al. | May 2001 | B1 |
| 6226751 | Arrow et al. | May 2001 | B1 |
| 6226752 | Gupta et al. | May 2001 | B1 |
| 6233565 | Lewis et al. | May 2001 | B1 |
| 6275944 | Kao et al. | Aug 2001 | B1 |
| 6289462 | McNabb et al. | Sep 2001 | B1 |
| 6317830 | Stolz | Nov 2001 | B1 |
| 6385596 | Wiser et al. | May 2002 | B1 |
| 6470397 | Shah et al. | Oct 2002 | B1 |
| Entry |
|---|
| Neuman, B. Clifford and Ts'o, Theodore, “Kerberos: An Authentication Service for Computer Networks,” IEEE Communications Magazine, Sep. 1994, pp. 33-38, vol. 32, No. 9. |
| Samar, Vipin and Lai, Charlie, “Making Login Services Independent of Authentication Technologies,” 3rd ACM Conference on Computer and Communications Security, Mar. 1996. |