| Number | Name | Date | Kind |
|---|---|---|---|
| 4218738 | Matyas et al. | Aug 1980 | |
| 4223403 | Konheim et al. | Sep 1980 | |
| 4227253 | Ehrsam et al. | Oct 1980 | |
| 4386233 | Smid et al. | May 1983 | |
| 4500750 | Elander et al. | Feb 1985 | |
| 4503287 | Morris et al. | Mar 1985 | |
| 4558176 | Arnold et al. | Dec 1985 | |
| 4578530 | Zeidler | Mar 1986 | |
| 4620276 | Daniell et al. | Oct 1986 | |
| 4683968 | Appelbaum et al. | Aug 1987 | |
| 4723283 | Nagasawa et al. | Feb 1988 | |
| 4723284 | Munck et al. | Feb 1988 | |
| 4850017 | Matyas et al. | Jul 1989 | |
| 4903299 | Lee et al. | Feb 1990 | |
| 4918728 | Matyas et al. | Apr 1990 | |
| 4924514 | Matyas et al. | May 1990 | |
| 4924515 | Matyas et al. | May 1990 | |
| 4941176 | Matyas et al. | Jul 1990 |
| Entry |
|---|
| R. W. Jones, "Some Techniques for Handling Encipherment Keys," ICL Technical Journal, Nov. 1982, pp. 175-188. |
| D. W. Davies & W. L. Price, "Security for Computer Networks," John Wiley & Sons, N.Y., 1984, Section 6.5, Key Management with Tagged Keys, pp. 168-172. |