Cited in | Search | Type: | Patent literature | Publication No.: | WO0117161
[A] (RECOURSE TECHNOLOGIES INC [US]) [A] 1-13 * abstract ** page 6, line 3 - page 8, line 19 *; | Type: | Patent literature | Publication No.: | US6202157
[Y] (BROWNLIE MICHAEL [CA], et al) [Y] 1-13 * abstract * * figures 1-5 * * column 2, line 56 - column 8, line 41 *; | Type: | Patent literature | Publication No.: | US6279113
[A] (VAIDYA VIMAL [US]) [A] 1-13 * abstract * * column 2, line 60 - column 4, line 39 *; | Type: | Non-patent literature | Publication information: | [Y] - SCHNEIER B, "Applied cryptography:ONE-WAY HASH FUNCTIONS", APPLIED CRYPTOGRAPHY : PROTOCOLS, ALGORITHMS, AND SOURCE CODE IN C, NEW YORK, NY : JOHN WILEY & SONS, US, (1996), ISBN 0-471-12845-7, pages 30 - 31, XP002961563 [Y] 1-13 * page 30, paragraph 4 - page 31, paragraph 1 * | Type: | Non-patent literature | Publication information: | [Y] - ALEC YASINSAC, "An Environment for security protocol intrusion detection", (2001), pages 1 - 23, URL: http://citeseer.ist.psu.edu/yasinsac01environment.html, (20050711), XP002336254 [Y] 5,6,9-13 * page 1, paragraph 2 * * page 4, paragraph 1 * * page 5, paragraph 2 - page 16, paragraph 1 * |