Jacquelyn Gavron and Joseph Moran, “How to Use Microsoft Windows NT 4 Workstation”, 1996 Ziff Davis Press, pp. 30-31.* |
“NetChex”, Netl, Inc., Home Page (Internet Feb. 1997). |
“Mondex International”, Mondex International Limited, Home Page (Internet Feb. 1997). |
“Electronic Payment Schemes”, Dr. Phillip M. Hallam-Baker, World Wide Web Consortium (Internet Feb. 1997). |
“DigiCash”, DigiCash by, Home Page (Internet Feb. 1997). |
“CyberCash”, CyberCash, Inc., Home Page (Internet Feb. 1997) |
Phillip M. Hallam-Baker, “Micro Payment Transfer Protocol (MPTP) Version 0.1”, W3C Working Draft, Nov. 22, 1995. |
“Secure Electronic Transaction (SET) Specification”, Book 2: Technical Specifications, Draft for Public Comment, Feb. 23, 1996, pp. 1-10; 129-186. |
Blaze, M., “High-Bandwidth Encryption with Low-Bandwidth Smartcards”, in Fast Software Encryption: Third Int'l Workshop (ed. D. Gollman), Feb. 1996. |
“The Copyright Website” Home Page (Internet 7/97). |
Intellectual Property: The Property of the Mind, The Economist, Jul. 27, 1996, pp. 57-59. |
Lehman, B., “Intellectual Property & the Nat'l. Information Infrastructure”, U.S. Patent and Trademark Office, Sep. 1995, pp. 177-200. |
“CCC Online”, Copyright Clearance Center, Inc. (Internet 7/97). |
“IBM Cryptolope Containers”, IBM infoMarket, International Business Machines Corporation (Internet 8/97). |
“IBM infoMarket Rights Management Overview”, IBM infoMarket, International Business Machines Corporation (Internet 8/97). |
“WIBU Systems Copy Protection”, WIBU-Systems AG (Internet 2/97). |
“Microsoft Authenticode”, Microsoft Corporation (Internet 2/97). |
“McAfee Network Security & Management”, McAfee Associates Inc. (Internet 2/97). |
“SoftLock Services Home Page”, SoftLock Services, Inc. (Internet 2/97). |
Bruno Struif, “The Use of Chipcards for Electronic Signatures and Encryption”, IEEE Proceedings of the VLSI and Computer Peripherals Conference, May 1989, pp. 4-155 -4-158. |
Stephen T. Kent, “Protecting Externally Supplied Software in Small Computers”, Massachusetts Institute of Technology, Sep. 1980, pp. 2-8, 12-39, 67-76 and 212-236. |
R. Mori and M. Kawahara, “Superdistribution: The Concept and the Architecture”, The Transactions of the IEICE, vol. E73, No. 7, Jul. 1990, pp. 1133-1146. |
John Kelsey and Bruce Schneier, “Authenticating Outputs of Computer Software Using a Cryptographic Co-Processor”, Proceedings of CARDIS '96, Amsterdam (1996). |
Federal Information Processing Standards Publication 190, “Annoucing The Guideline For The Use Of Advanced Authentication Technology Alternatives”, Sep. 28, 1994. |
Oded Goldreich and Rafail Ostrovsky, “Software Protection and Simulation on Oblivious RAM's”, Journal of the ACM, vol. 43, No. 3, May 1996, pp. 431-473. |
Trent Jaeger and Aviel D. Rubin, “Protocols for Authenticated Download to Mobile Information Appliances”, The University of Michigan, Dept. of Electrical Engineering & Computer Science, Dec. 1995. |