Novell, "Encryption Alternatives," comments submitted in Key Escrow Alternatives Workshop, Jun. 10, 1994. |
Computer Associates International, Inc., "Commercial Cryptography Perspectives," comments submitted in Key Escrow Alternatives Workshop, Jun. 10, 1994. |
Puhl, Larry, Motorola, comments submitted in Key Escrow Alternatives Workshop, Jun. 10, 1994. |
Ferguson, Bill, Semaphore, comments submitted in Key Escrow Alternatives Workshop, Jun. 10, 1994. |
COMPAQ Computer Corporation, "Proposed NIST Draft," comments submitted in Key Escrow Alternatives Workshop, Jun. 10, 1994. |
Housley, Russell, SPYRUS, letter to Lynn McNulty, Aug. 3, 1994. |
Desmedt, Yvo et al., "A Scientific Statement on the Clipper Chip Technology and Alternatives," University of Wisconsin, Milwaukee. |
Maher, David p., "Trust in the New Information Age," AT&T Technical Jornal, Sep./Oct. 1994, vol. 73, No. 5, Security Technologies, pp. 9-16. |
Micali, S., "Fair Cryptosystems," Aug. 11, 1993. |
Bandstad et al., "Draft Proposed Escrowed Encryption Standard," viewgraphs presented at Computer Security and Privacy meeting, Mar. 1994. |
Blaze, M., "Protocol Failure in the Escrowed Encryption Standard," presented on the Internet, Jun. 3, 1994. |
Scheidt et al., "Private Escrow Key Management," Key Escrow Encryption Workshop, paper distributed Jun. 10, 1994. |
"A Solution for the International Community," TECSEC, Key Escrow Encryption Workshop, viewgraphs distributed Jun. 10, 1994. |
"Private Escrow Key Management," TECSEC, Key Escrow Encryption Workshop, viewgraphs distributed Jun. 10, 1994. |
"An Advanced Key Management System," TECSEC, Key Escrow Encryption Workshop, paper distributed Jun. 10, 1994. |
Denning et al., "Key Escrowing Today," IEEE Communications, Sep. 1994. |
Harn, L. and H. Y. Lin, "Integration of User Authentication and Access Control," IEEE Proceedings-E, vol. 139, No. 2, pp. 139-143, Mar. 1992. |
Brickell et al., "SKIPJACK Review: Interim Report: The SKIPJACK Algorithm," Georgetown University, Office of Public Affairs, pp. 1-6, Jul. 28, 1993. |
Denning et al., "A Taxonomy for Key Encryption System," draft distributed Sep. 24, 1994. |
Denning, D., "Key Escrow Encryption: Does it Protect of Compromise User Interest?," Jan. 3, 1995. |
Denning, D., "Observations about Key Escrow Alternatives," Jan. 2, 1995. |
Droge, John C., "International Key Escrow," presented to NIPLI, Sep. 22, 1994. |
Ford et al., "A Key Distribution Method for Object-Based Protection," presented at the Second ACM Conference on Computer and Communications Security, Nov. 2-4, 1994, Faifax, VA., pp. 193-197. |
Denning, Dorothy, "International Key Escrow Encryption: Proposed Objectives," Georgetown University, draft of May 23, 1994. |
Eldridge, Alan, Lotus Notes, "Key Escrow for Lotus Notes," comments submitted in Key Escrow Alternatives Workshop, Jun. 10, 1994. |
Fischer, Addison, Fischer International, "Software Key Escrow--Corporate Implementation," comments submitted in Key Escrow Alternatives Workshop, Jun. 10, 1994. |