It's not the joke. But it provides an interesting list of individuals that
should be kept for the future reference.


Chuck Williams, Nevenko Zunic, Stephen M. Matyas, Jr., Sarbari Gupta, Michael Willett, 
Key Recovery Alliance (KRA) Technology Papers,
Special Issue --- Introduction, Computers And Security (19)1 (2000) pp. 18-20
[abstract] | [Full text] (PDF 162 Kbytes) 

Michael Smith, Paul VanOorschot, Michael Willett, Cryptographic Information Recovery 
Using Key Recovery, Computers And Security (19)1
(2000) pp. 21-27
[abstract] | [Full text] (PDF 460 Kbytes) 

Michael Willett, Features, Attributes, Characteristics, and Traits (FACTs) of Key 
Recovery Schemes/Products, Computers And Security (19)1
(2000) pp. 28-30
[abstract] | [Full text] (PDF 143 Kbytes) 

John Kennedy, Stephen M. Matyas, Jr., Nevenko Zunic, Key Recovery Functional Model, 
Computers And Security (19)1 (2000) pp. 31-36
[abstract] | [Full text] (PDF 376 Kbytes) 

Stephen M. Matyas, Jr., Nevenko Zunic, Additional Key Recovery Functions, Computers 
And Security (19)1 (2000) pp. 37-40
[abstract] | [Full text] (PDF 266 Kbytes) 

Sarbari Gupta, A Common Key Recovery Block Format: Promoting Interoperability Between 
Dissimilar Key Recovery Mechanisms, Computers
And Security (19)1 (2000) pp. 41-47
[abstract] | [Full text] (PDF 421 Kbytes) 

Chuck Williams, Nevenko Zunic, Global Interoperability for Key Recovery, Computers And 
Security (19)1 (2000) pp. 48-55
[abstract] | [Full text] (PDF 554 Kbytes) 

Sarbari Gupta, Stephen M. Matyas, Jr., Public Key Infrastructure: Analysis of Existing 
and Needed Protocols and Object Formats for Key
Recovery, Computers And Security (19)1 (2000) pp. 56-68
[abstract] | [Full text] (PDF 824 Kbytes) 

Abby Maclean, Stephen M. Matyas, Jr., Nevenko Zunic, Organization Implementation 
Guidelines for Recovery of Encrypted Information,
Computers And Security (19)1 (2000) pp. 69-81
[abstract] | [Full text] (PDF 888 Kbytes) 

Nevenko Zunic, Organization Considerations for Retrieval of Stored Data via Key 
Recovery Methods, Computers And Security (19)1 (2000) pp.
82-85
[abstract] | [Full text] (PDF 262 Kbytes) 

Tom Markham, Chuck Williams, Key Recovery Header for IPSEC, Computers And Security 
(19)1 (2000) pp. 86-90
[abstract] | [Full text] (PDF 279 Kbytes) 

David Balenson, Tom Markham, ISAKMP Key Recovery Extensions, Computers And Security 
(19)1 (2000) pp. 91-99
[abstract] | [Full text] (PDF 552 Kbytes) 

Timothy G. Shoriak, SSL/TLS Protocol Enablement for Key Recovery, Computers And 
Security (19)1 (2000) pp. 100-104
[abstract] | [Full text] (PDF 231 Kbytes) 

Reply via email to