| Number | Name | Date | Kind |
|---|---|---|---|
| 5241594 | Kung | Aug 1993 | A |
| 5592553 | Guski et al. | Jan 1997 | A |
| 5655077 | Jones et al. | Aug 1997 | A |
| 5754830 | Butts et al. | May 1998 | A |
| 5922074 | Richard et al. | Jul 1999 | A |
| 5944824 | He | Aug 1999 | A |
| 6052785 | Lin et al. | Apr 2000 | A |
| 6067623 | Blakley, III et al. | May 2000 | A |
| 6275941 | Saito et al. | Aug 2001 | B1 |
| 6401211 | Brezak et al. | Jun 2002 | B1 |
| 6442692 | Zilberman | Aug 2002 | B1 |
| 6556995 | Child et al. | Apr 2003 | B1 |
| 20030041263 | Devine et al. | Feb 2003 | A1 |
| Entry |
|---|
| IBM Technical Bulletin, Customized Handling of Application Errors under OS/2, Apr. 1, 1992, vol. 34, pp. 459-461.* |
| Schneier, Applied Cryptography, 1996, John Wiley & Sons, Inc., Second Edition, 574-575.* |
| Davies, Computer Networks and Their Protocols, 1979, John Wiley& Sons, Inc., 355-388.* |
| Bruce Thompson, Safety in Cyberspace: PLanning Effective Web-to-Host Access Security, Aug. 1999, Enterprise Systems Journal. |