Sun Microsystems, The Java Language Environment : A White Paper, pp. 1-86, Oct., 1995. |
Mohay G. et al., "Calss-computer architecture for secure systems", Sixteenth Australian Computer Conference. ACSC-16, Brisbane, QLD., Australia, Feb. 1993, (pp. 1-5). |
Van Hoff A., "Java and Internet programming", Dr. Dobb's Journal, Aug. 1995, USA, vol. 20, No. 8, pp. 56, 58, 60-61, 101-102, XP000570180 ISSN 1044-789X. |
van Hoff, Arthur; java and Internet Programming: Dr. Dobb's Journal on CD-ROM; pp. 1-8, Aug., 1995. |
Schneier, Bruce; Untangling Public-Key Cryptography; Dr. Dobb's Journal on CD-ROM; pp. 1-13, May 1992. |
Stallings, William; SHA: The Secure Hash Algorithm; Dr. Dobb's Journal on CD-ROM; pp. 1-3, Apr., 1994. |
Schneier, Bruce; One-Way Hash Functions; Dr. Dobb's Journal on CD-ROM; pp. 1-9, Sep., 1991. |
Stallings, William; Make it real (using authentication in network security; LAN Magazine v8 n9 p105(6)), Sep., 1993. |
Davida et al; Defending Systems Against Viruses through Cryptographic Authentication; IEEE; pp. 312-318, Jul.,1989. |
Gosling et al; The Java language Environment: A White Paper, May 1995. |