Lane, Alex, “Cyber-Privacy: In Cyberspace, the Wall Have Ears”, Computer Shopper, vol. 14, No. 9, Sep. 1994.* |
Anonymous, “Cylink: Cylink Uses Strong Keys to Lock Desktop Data With SecureNode Information Security System”, Press Release, Dialog File 810:Business Wire, Mar. 28, 1996.* |
Foroozesh, Mehrdad, “Protecting Your Data With Cryptography”, UNIX Review, vol. 14, No. 12 , Nov. 1996.* |
Toigo, Jon William, “Use Trusted Third Parties to Secure Data”, Databased Web Advisor, vol. 15, No. 7, p. 52, Jul. 1997.* |
Anonymous, “Encryption in Popular E-Mail Software”, Internal Auditor, vol. 55, No. 6, pp 28-29, Dec. 1998.* |
Cravotta, Nicholas, “Accelerating High-Speed Encryption: One Bottleneck After Another”, EDN, vol. 46, No. 18, Aug. 16, 2001. |