| Harn, L. and H. Y. Lin, "Integration of User Authentication and Access Control," IEEE Proceedings-E, vol. 139, No. 2, pp. 139-143, Mar. 1992. |
| Brickell et al., "SKIPJACK Review: Interim Report: The SKIPJACK Algorithm," Georgetown University, Office of Public Affairs, pp. 1-6, Jul. 28, 1993. |
| Computer Systems Laboratory, National Institute of Standards and Technology, Gaithersburg, MD, "Escrowed Encryption Standard (EES)," Federal Information Processing Standards Publication, FIPS Pub 185, Feb. 9, 1994. |
| Denning, Dorothy, "The Clipper Chip: A Technical Summary," Revised Apr. 21, 1993. |
| Denning, Dorothy, "The Clipper Chip: A Technical Summary," Apr. 19, 1993. |
| Micali, S., "Fair Cryptosystems," Aug. 11, 1993. |
| Branstad et al., Draft Proposed Escrowed Encryption Standard, viewgraphs presented at Computer Security and Privacy meeting, Mar. 1994. |
| Blaze, M., "Protocol Failure in the Escrowed Encryption Standard," presented on the Internet, Jun. 3, 1994. |
| Scheidt et al., "Private Escrow Key Management," Key Escrow Encryption Workshop, paper distributed Jun. 10, 1994. |
| "A Solution for the International Community," TECSEC, Key Escrow Encryption Workshop, viewgraphs distributed Jun. 10, 1994. |
| "Private Escrow Key Management," TECSEC, Key Escrow Encryption Workshop, viewgraphs distributed Jun. 10, 1994. |
| "An Advanced Key Management System," TECSEC, Key Escrow Encryption Workshop, paper distributed Jun. 10, 1994. |
| Denning, Dorothy, "International Key Escrow Encryption: Proposed Objectives," Georgetown University, draft of May 23, 1994. |
| Denning, Dorothy et al., "Key Escrowing Today," Georgetown University, pre-published draft on Jul. 13, 1994 of IEEE Communications of Sep. 1994. |
| Eldridge, Alan, Lotus Notes, "Key Escrow for Lotus Notes," comments submitted in Key Escrow Alternatives Workshop, Jun. 10, 1994. |
| Fischer, Addison, Fischer International, "Software Key Escrow--Corporate Implementation," comments submitted in Key Escrow Alternatives Workshop, Jun. 10, 1994. |
| Novell, "Encryption Alternatives," comments submitted in Key Escrow Alternatives Workshop, Jun. 10, 1994. |
| Computer Associates International, Inc., "Commercial Crytography Perspectives," comments submitted in Key Escrow Alternatives Workshop, Jun. 10, 1994. |
| Puhl, Larry, Motorola, comments submitted in Key Escrow Alternatives Workshop, Jun. 10, 1994. |
| Ferguson, Bill, Semaphore, comments submitted in Key Escrow Alternatives Workshop, Jun. 10, 1994. |
| COMPAQ Computer Corporation, "Proposed NIST Draft," comments submitted in Key Escrow Alternatives Workshop, Jun. 10, 1994. |
| Housley, Russell, SPYRUS, letter to Lynn McNulty, Aug. 3, 1994. |
| Desmedt, Yvo et al., "A Scientific Statement on the Clipper Chip Technology and Alternatives," University of Wisconsin, Milwaukee. |
| Denning, D. et al., "A Taxonomy for Key Escrow Encryption Systems", draft distributed Sep. 24, 1994. |
| Denning, D., "Key Escrow Encryption: Does it Protect or Compromise User Interests?", Jan. 3, 1995. |
| Denning, D., "Observations About Key Escrow Alternatives", Jan. 2, 1995. |
| Droge, John C., "International Key Escrow", presented to NIPLI, Sep. 22, 1994. |
| Ford et al., "A Key Distribution Method for Object-Based Protection", presented at the Second ACM Conference on Computer and Communications Security, Nov. 2-4, 1994, Fairfax, VA, pp. 193-197. |
| Maher, David P., "Trust in the New Information Age", AT&T Technical Journal, Sep./Oct. 1994, vol. 73, No. 5, Security Technologies, pp. 9-16. |
| Zimmerman, P., "Phil's Pretty Good Software Presents PGP: Pretty Good Privacy Public Key Encryption for the Masses", PGP User's Guide vol. I: Essential Topics, Dec. 3, 1992, pp. 1-40. |
| Zimmerman, P., "Phil's Pretty Good Software Presents PGP: Pretty Good Privacy Public Key Encryption for the Masses", PGP User's Guide vol. II: Special Topics, Dec. 3, 1992, pp. 1-53. |
| Appendix A. Internal Data Structures Used by PGP 2.1, Dec. 3, 1992, pp. 1-18. |