Number | Name | Date | Kind |
---|---|---|---|
5481720 | Loucks et al. | Jan 1996 | A |
5535276 | Ganesan | Jul 1996 | A |
5544322 | Cheng et al. | Aug 1996 | A |
5560008 | Johnson et al. | Sep 1996 | A |
5706427 | Tabuki | Jan 1998 | A |
5835712 | DuFresne | Nov 1998 | A |
5875296 | Shi et al. | Feb 1999 | A |
6065117 | White | May 2000 | A |
6073241 | Rosenberg et al. | Jun 2000 | A |
Number | Date | Country |
---|---|---|
0 695 985 | Feb 1996 | EP |
Entry |
---|
Reichard, K. and E. Johnson. “Securing your X environment.” Unix Review. vol. 13, n2, p 73 (4). Feb. 1995.* |
Schneier, Bruce. Applied Cryptography, 2nd ed. John Wiley and Sons. pp. 38, 39, 566-571, Oct. 1995.* |
(1) B. Schneier, “Applied Cryptography: Protocols, Algorithms, and Source Code in C. ”, 1994. |