| Number | Name | Date | Kind |
|---|---|---|---|
| 5481720 | Loucks et al. | Jan 1996 | A |
| 5535276 | Ganesan | Jul 1996 | A |
| 5544322 | Cheng et al. | Aug 1996 | A |
| 5560008 | Johnson et al. | Sep 1996 | A |
| 5706427 | Tabuki | Jan 1998 | A |
| 5835712 | DuFresne | Nov 1998 | A |
| 5875296 | Shi et al. | Feb 1999 | A |
| 6065117 | White | May 2000 | A |
| 6073241 | Rosenberg et al. | Jun 2000 | A |
| Number | Date | Country |
|---|---|---|
| 0 695 985 | Feb 1996 | EP |
| Entry |
|---|
| Reichard, K. and E. Johnson. “Securing your X environment.” Unix Review. vol. 13, n2, p 73 (4). Feb. 1995.* |
| Schneier, Bruce. Applied Cryptography, 2nd ed. John Wiley and Sons. pp. 38, 39, 566-571, Oct. 1995.* |
| (1) B. Schneier, “Applied Cryptography: Protocols, Algorithms, and Source Code in C. ”, 1994. |