Number | Name | Date | Kind |
---|---|---|---|
5241594 | Kung | Aug 1993 | A |
5592553 | Guski et al. | Jan 1997 | A |
5655077 | Jones et al. | Aug 1997 | A |
5754830 | Butts et al. | May 1998 | A |
5922074 | Richard et al. | Jul 1999 | A |
5944824 | He | Aug 1999 | A |
6052785 | Lin et al. | Apr 2000 | A |
6067623 | Blakley, III et al. | May 2000 | A |
6275941 | Saito et al. | Aug 2001 | B1 |
6401211 | Brezak et al. | Jun 2002 | B1 |
6442692 | Zilberman | Aug 2002 | B1 |
6556995 | Child et al. | Apr 2003 | B1 |
20030041263 | Devine et al. | Feb 2003 | A1 |
Entry |
---|
IBM Technical Bulletin, Customized Handling of Application Errors under OS/2, Apr. 1, 1992, vol. 34, pp. 459-461.* |
Schneier, Applied Cryptography, 1996, John Wiley & Sons, Inc., Second Edition, 574-575.* |
Davies, Computer Networks and Their Protocols, 1979, John Wiley& Sons, Inc., 355-388.* |
Bruce Thompson, Safety in Cyberspace: PLanning Effective Web-to-Host Access Security, Aug. 1999, Enterprise Systems Journal. |