| Software Product protection, Min Chen, Telecommunication Software and Multimedia ISSN 1455-9749, Article in T-110.501 Seminar on Network Security, 2001ISBN 951-22-5807-2.* |
| Trusting DRMSoftware, Cheng et al., W3C workshop on DRM, Jan. 2001.* |
| Hardware Contention Serialization Algorithm, IBM Technical Disclosure Bulletin, vol. 38, Isue No. 4, Apr. 1995, pp. 73-78.* |
| “Microsoft Computer Dictionary”, 5th Edition, (2002),484. |
| “Mechanics of the Common Security Services Manager (CSSM)”, Rajan and Wood, Intel Corporation 1999, pp. 1-17. |
| “Making PC Interaction Trustworthy for Communications, Commerce and Content”, Intel Security Program, Jul. 1998, pp. 1-6. |
| “Security Prevails in e-mail coding”, pp. 1-2. |
| “Secure Way Cryptographic Infrastructure”, IBM 1996, pp. 1-3. |
| “Supporting Services and Sub-Systems”, IBM 1996, pp. 1-4. |
| “APIs and Toolkits”, IBM 1996, pp. 1-2. |
| “Cryptographic Engines”, IBM 1996, pp. 1-2. |
| “The IBM Secure Way Cryptographic Infrastructure”, IBM 1996, pp. 1-2. |
| “Applications”, IBM 1996, pp. 1-2. |
| “Conclusion”, IBM 1996, pp. 1-3. |
| “High-Tech Leader Join Forces to Enable International Strong Encryption”, IBM 1996, pp. 1-3. |
| “Gore to Unveil Encryption Policy”, The Net 1996, pp. 1-2. |
| “White House Encryption Initiative-2: IBM, Digital Support”, Dow Jones International News, Oct. 01, 1996, pp. 1-3. |
| “IBM (International Business Machines Corp) to Form Consotium for Data Encryption”, Yahoo, Oct. 01, 1996, pp. 1-2. |
| “Method for Ensuring Integrity of Public Key Algorithm Public and Private Keys and for Coupling the usage of a Key to the Correct Specification of the Key's Associated Control Vector”, SPI Database of Software Technologies, Jun. 1994, 1 page. |
| “Solaris Manpage for Intro(1M)(maintenance Commands)”, SPI Database of Software Technologies, 1993, pp. 4-7. |
| “SunOS Manpage for INTRO(4)”, SPI Database of Software Technologies, Apr. 29, 1992, pp. 14-15. |
| “SunOS Manpage for INTRO(8)”, SPI Database of Software Technologies, May 22, 1991, pp. 7-11. |
| Two-Level Data Security System for an IBM Personal Computer; SPI Database of Software Technologies, Mar. 1987, pp. 11-12. |
| “Statement of the Vice President”, The White House, Oct. 01, 1996, pp. 1-3. |