| Harn, L. and H. Y. Lin, "Integration of User Authentication and Access Control," IEEE Proceedings-E, vol. 139, No. 2, pp. 139-143, Mar. 1992. |
| Brickell et al., "SKIPJACK Review: Interim Report: The SKIPJACK Algorithm," Georgetown University, Office of Public Affairs, pp. 1-6, Jul. 28, 1993. |
| Computer Systems Laboratory, National Institute of Standards and Technology, Gaithersburg, MD, "Escrowed Encryption Standard (EES)," Federal Information Processing Standards Publication, FIPS PUB 185, Feb. 9, 1994. |
| Denning, Dorothy, "The Clipper Chip: A Technical Summary," Revised Apr. 21, 1993. |
| Denning, Dorothy, "The Clipper Chip: A Technical Summary," Apr. 19, 1993. |
| Micali, S., "Fair Cryptosystems," Aug. 11, 1993. |
| Branstad et al., "Draft Proposed Escrowed Encryption Standard", viewgraphs presented at Computer Security and Privacy meeting, Mar. 1994. |
| Blaze, M., "Protocol Failure in the Escrowed Encryption Standard," presented on the Internet, Jun. 3, 1994. |
| Scheidt et al., "Private Escrow Key Management," Key Escrow Encryption Workshop, paper distributed Jun. 10, 1994. |
| "A Solution for the International Community," TECSEC, Key Escrow Encryption Workshop, viewgraphs distributed Jun. 10, 1994. |
| "Private Escrow Key Management," TECSEC, Key Escrow Encryption Workshop, viewgraphs distributed Jun. 10, 1994. |
| "An Advanced Key Management System," TECSEC, Key Escrow Encryption Workshop, paper distributed Jun. 10, 1994. |
| Denning, Dorothy "International Key Escrow Encryption: Proposed Objectives," Georgetown University, draft of May 23, 1994. |
| Denning, Dorothy et al., "Key Escrowing Today," Georgetown University, pre-published draft on Jul. 13, 1994 of IEEE Communications of Sep. 1994. |
| Eldridge, Alan, Lotus Notes, "Key Escrow for Lotus Notes," comments submitted in Key Escrow Alternatives Workshop, Jun. 10, 1994. |
| Fischer, Addison, Fischer International, "Software Key Escrow--Corporate Implementation," comments submitted in Key Escrow Alternatives Workshop, Jun. 10, 1994. |
| Novell, "Encryption Alternatives," comments submitted in Key Escrow Alternatives Workshop, Jun. 10, 1994. |
| Computer Associates International, Inc., "Commercial Cryptography Perspectives," comments submitted in Key Escrow Alternatives Workshop, Jun. 10, 1994. |
| Puhl, Larry, Motorola, comments submitted in Key Escrow Alternatives Workshop, Jun. 10, 1994. |
| Ferguson, Bill, Semaphore, comments submitted in Key Escrow Alternatives Workshop, Jun. 10, 1994. |
| COMPAQ Computer Corporation, "Proposed NIST Draft," comments submitted in Key Escrow Alternatives Workshop, Jun. 10, 1994. |
| Housley, Russell, SPYRUS, letter to Lynn McNulty, Aug. 3, 1994. |
| Desmedt, Yvo et al., "A Scientific Statement on the Clipper Chip Technology and Alternatives," University of Wisconsin, Milwaukee. |