It's not the joke. But it provides an interesting list of individuals that
should be kept for the future reference.
Chuck Williams, Nevenko Zunic, Stephen M. Matyas, Jr., Sarbari Gupta, Michael Willett,
Key Recovery Alliance (KRA) Technology Papers,
Special Issue --- Introduction, Computers And Security (19)1 (2000) pp. 18-20
[abstract] | [Full text] (PDF 162 Kbytes)
Michael Smith, Paul VanOorschot, Michael Willett, Cryptographic Information Recovery
Using Key Recovery, Computers And Security (19)1
(2000) pp. 21-27
[abstract] | [Full text] (PDF 460 Kbytes)
Michael Willett, Features, Attributes, Characteristics, and Traits (FACTs) of Key
Recovery Schemes/Products, Computers And Security (19)1
(2000) pp. 28-30
[abstract] | [Full text] (PDF 143 Kbytes)
John Kennedy, Stephen M. Matyas, Jr., Nevenko Zunic, Key Recovery Functional Model,
Computers And Security (19)1 (2000) pp. 31-36
[abstract] | [Full text] (PDF 376 Kbytes)
Stephen M. Matyas, Jr., Nevenko Zunic, Additional Key Recovery Functions, Computers
And Security (19)1 (2000) pp. 37-40
[abstract] | [Full text] (PDF 266 Kbytes)
Sarbari Gupta, A Common Key Recovery Block Format: Promoting Interoperability Between
Dissimilar Key Recovery Mechanisms, Computers
And Security (19)1 (2000) pp. 41-47
[abstract] | [Full text] (PDF 421 Kbytes)
Chuck Williams, Nevenko Zunic, Global Interoperability for Key Recovery, Computers And
Security (19)1 (2000) pp. 48-55
[abstract] | [Full text] (PDF 554 Kbytes)
Sarbari Gupta, Stephen M. Matyas, Jr., Public Key Infrastructure: Analysis of Existing
and Needed Protocols and Object Formats for Key
Recovery, Computers And Security (19)1 (2000) pp. 56-68
[abstract] | [Full text] (PDF 824 Kbytes)
Abby Maclean, Stephen M. Matyas, Jr., Nevenko Zunic, Organization Implementation
Guidelines for Recovery of Encrypted Information,
Computers And Security (19)1 (2000) pp. 69-81
[abstract] | [Full text] (PDF 888 Kbytes)
Nevenko Zunic, Organization Considerations for Retrieval of Stored Data via Key
Recovery Methods, Computers And Security (19)1 (2000) pp.
82-85
[abstract] | [Full text] (PDF 262 Kbytes)
Tom Markham, Chuck Williams, Key Recovery Header for IPSEC, Computers And Security
(19)1 (2000) pp. 86-90
[abstract] | [Full text] (PDF 279 Kbytes)
David Balenson, Tom Markham, ISAKMP Key Recovery Extensions, Computers And Security
(19)1 (2000) pp. 91-99
[abstract] | [Full text] (PDF 552 Kbytes)
Timothy G. Shoriak, SSL/TLS Protocol Enablement for Key Recovery, Computers And
Security (19)1 (2000) pp. 100-104
[abstract] | [Full text] (PDF 231 Kbytes)