Number | Name | Date | Kind |
---|---|---|---|
4922486 | Lidinsky et al. | May 1990 | A |
4962532 | Kasiraj et al. | Oct 1990 | A |
5003595 | Collins et al. | Mar 1991 | A |
5163147 | Orita | Nov 1992 | A |
5241594 | Kung | Aug 1993 | A |
5241599 | Bellovin et al. | Aug 1993 | A |
5319644 | Liang | Jun 1994 | A |
5351136 | Wu et al. | Sep 1994 | A |
5416842 | Aziz | May 1995 | A |
5421006 | Jablon et al. | May 1995 | A |
5440635 | Bellovin et al. | Aug 1995 | A |
5570361 | Norizuki et al. | Oct 1996 | A |
5586260 | Hu | Dec 1996 | A |
5621721 | Vatuone | Apr 1997 | A |
5655077 | Jones et al. | Aug 1997 | A |
5659542 | Bell et al. | Aug 1997 | A |
5671354 | Ito et al. | Sep 1997 | A |
5680461 | McManis | Oct 1997 | A |
5684950 | Dare et al. | Nov 1997 | A |
5691997 | Lackey, Jr. | Nov 1997 | A |
5708780 | Levergood et al. | Jan 1998 | A |
5764235 | Hunt et al. | Jun 1998 | A |
5764772 | Kaufman et al. | Jun 1998 | A |
5793763 | Mayes et al. | Aug 1998 | A |
5815665 | Teper et al. | Sep 1998 | A |
5835036 | Takefman | Nov 1998 | A |
5835727 | Wong et al. | Nov 1998 | A |
5845070 | Ikudome | Dec 1998 | A |
5898780 | Liu et al. | Apr 1999 | A |
5930804 | Yu et al. | Jul 1999 | A |
5944824 | He | Aug 1999 | A |
5987232 | Tabuki | Nov 1999 | A |
5991810 | Shapiro et al. | Nov 1999 | A |
6006334 | Nguyen et al. | Dec 1999 | A |
6011910 | Chau et al. | Jan 2000 | A |
6018770 | Little et al. | Jan 2000 | A |
6021496 | Dutcher et al. | Feb 2000 | A |
6026165 | Marino et al. | Feb 2000 | A |
6044155 | Thomlinson et al. | Mar 2000 | A |
6047376 | Hosoe | Apr 2000 | A |
6052785 | Lin et al. | Apr 2000 | A |
6055236 | Nessett et al. | Apr 2000 | A |
6076110 | Murphy, Jr. et al. | Jun 2000 | A |
6092196 | Reiche | Jul 2000 | A |
6094485 | Weinstein et al. | Jul 2000 | A |
6119160 | Zhang et al. | Sep 2000 | A |
6141687 | Blair | Oct 2000 | A |
6282652 | Scheifler | Aug 2001 | B1 |
Number | Date | Country |
---|---|---|
WO 9953408 | Oct 1999 | WO |
Entry |
---|
Bellare et al., “Keying Hash Functions for Message Authentication”, 1996, Advances in Cryptology-Crypto 96 Proceedings, Lecture Notes in Computer Science, vol. 1109, N. Koblitz ed., Springer-Verlag. |
Bellovin, Steven M., “Problem Areas for the IP Security Protocols”, Jul. 22-25, 1996, Proceedings of the Sixth Usenix UNIX Security Symposium, San Jose, CA. |
Krawczyk, Hugo, “SKEME: A Versatile Secure Key Exchange Mechanism for Internet”, 1996, IEEE, Proceedings of the 1996 Symposium on Network and Distributed Systems Security. |