IBM Technical Disclosure Bulletin, “OpenDoc Container Security Encryption Technique for Stored Data,” vol. 38, No. 04, pp. 591-592, Apr. 1995. |
IBM Technical Disclosure Bulletin, “Secure Remote Configuration for Networked Computer Systems,” vol. 41, No. 01, pp. 653-655, Jan. 1998. |
S. Halevi, et al., “Public-Key Cryptography and Password Protocols,” 5th ACM Conference on Computer and Communications Security, San Francisco, CA, Nov. 2-5, 1998. |
Klein A. Bruggemann, et al., “The MeDoc Library: Security Aspects,” Digital Libraries in Computer Science: The MeDoc Approach, Berlin, Germany, pp. 103-114, 1998. |
J. Botting, “Security on the Internet: Authenticating the User,” Telecommunications (International Edition), vol. 31, No. 12, pp. 77-78, Dec. 1997. |
D. White, “Distributed Systems Security,” DBMS, vol. 10, No. 12, pp. 44-48, 50, 52, and 78, Nov. 1997. |
ST Kent, et al., “Personal Authentication System for Access Control to the Defense Data Network,” Conference Record of Eascon 82, 15th Annual Electronics and Aerospace Systems Conference, Washington, D.C., Sep. 20-22, 1982. |