Number | Name | Date | Kind |
---|---|---|---|
1657411 | Scherbius | Jan 1928 | A |
2975530 | Lindstein | Mar 1961 | A |
4255796 | Gabbe et al. | Mar 1981 | A |
4555805 | Talbot | Nov 1985 | A |
5148485 | Dent | Sep 1992 | A |
5239583 | Parrillo | Aug 1993 | A |
5245652 | Larson et al. | Sep 1993 | A |
5247497 | Cohn | Sep 1993 | A |
5297183 | Bareis et al. | Mar 1994 | A |
RE34587 | Crane et al. | Apr 1994 | E |
5321755 | Vlaar | Jun 1994 | A |
5500899 | Snow | Mar 1996 | A |
5754652 | Wilfong | May 1998 | A |
6055635 | Karlsson | Apr 2000 | A |
Entry |
---|
David Reilly, SOR Data Encryption With An Infinite Length Key, 1995.* |
Murphy, Bielby Roe, Read, o'gorman, Lennig, Automation of alternate billed calls using Speech Recognition IEEE, Jan. 1991.* |
Bruce Schneier, Applied Cryptography, pp. 8, 10, 13-15, and 52-53, Oct. 1995. |