References


[DiffieHellman] W. Diffie and M. E. Hellman. "New Directions in Cryptography," IEEE Transactions on Information Theory 22, 1976.

[FIPS81] NIST. "DES Modes of Operation." Federal Information Processing Standards Publication 81. http://www.itl.nist.gov/fipspubs/fip81.htm

[Schneier01] B. Schneier. "Attack Trees: Modeling Security Threats." Dr. Dobb's Journal 306, December 1999. http://www.schneier.com/paper-attacktrees-ddj-ft.html

[Schneier02] B. Schneier. Cryptogram, May 2002. http://www.schneier.com/crypto-gram-0205.html#5

[Schneier03] B. Schneier. "Yarrow: A Secure Pseudorandom Number Generator." http://www.schneier.com/yarrow.html

[Schneier04] B. Schneier. "Declassifying Skipjack." Cryptogram, July 1998. http://www.schneier.com/crypto-gram-9807.html#skip

[Hashfunc01] H. Lipma. "Hash Functions." http://www.cs.ut.ee/~helger/crypto/link/hash/

[RSA01] RSA Security. "Frequently Asked Questions About Today's Cryptography." http://www.rsasecurity.com/rsalabs/faq/sections.html

[RSA02] RSA Security. "What Are Some other Blocks Ciphers." http://www.rsasecurity.com/rsalabs/faq/3-6-7.html

[RSA03] RSA Security. "What Is Capstone." http://www.rsasecurity.com/rsalabs/faq/6-2-3.html

[AES01] E. Roback and M. Dworkin. "First AES Candidate Conference Report," August 1998. http://csrc.nist.gov/CryptoToolkit/aes/round1/conf1/j41ce-rob.pdf

[WeiDai01] Wei Dai. Crypto++ TM Library 5.0 Reference Manual. http://cryptopp.sourceforge.net/docs/ref5/

[WeiDai02] Wei Dai. Crypto++ 5.1 Benchmarks, July 2003. http://www.eskimo.com/~weidai/benchmarks.html

[Kaufman] Charlie Kaufman, Radia Perman, and Mike Speciner. Network Security: Private Communication in a Public World. Prentice Hall, 2002.

[Goldberg01] Ian Goldberg and David Wagner. "Randomness and the Netscape Browser," Dr. Dobbs' Journal, January 1996. http://www.cs.berkeley.edu/~daw/papers/ddj-netscape.html

[RFC1750] D. Eastlake, et al. "Randomness Recommendations for Security," December 1994. http://www.ietf.org/rfc/rfc1750.txt

[SCEP01] Cisco. Simple Certificate Enrollment Protocol. http://www.cisco.com/warp/public/cc/pd/sqsw/tech/scep_wp.html

[RFC2459] R. Housley, W. Ford, W. Polk, and D. Solo. "Internet X.509 Public Key Infrastructure Certificate and CRL Profile." The Internet Society, January 1999. http://www.ietf.org/rfc/rfc2459.txt.

[Moraes] Ian Moraes, Ph.D. "The Use of JNDI in Enterprise Java APIs." JDJ SYS-CON Media, August 1, 2000. http://jdj.sys-con.com/read/36454.htm

[Netscape01] A. Frier, P. Karlton, and P. Kocher. The SSL Protocol, Version 3.0, 1996. http://wp.netscape.com/eng/ssl3/ssl-toc.html

[RFC2246] T. Dierks and C. Allen. "The TLS Protocol Version 1.0," January 1999. http://www.ietf.org/rfc/rfc2246.txt

[RFC2104] H. Krawczyk, et al. "HMAC: Keyed-Hashing for Message Authentication," February 1997. http://www.ietf.org/rfc/rfc2104.txt

[ANSIX9.17] American National Standards Institute. American National Standard X9.17: Financial Institution Key Management (Wholesale), 1985.

[SSL01] Alan O. Freier, et al. "The SSL Protocol Version 3.0," November 18, 1996. http://wp.netscape.com/eng/ssl3/draft302.txt

[RFC2560] M. Meyers et al. "X509 Internet Public Key Infrastructure Online Certificate Status ProtocolOCSP," June 1999. http://www.ietf.org/rfc/rfc2560.txt




Core Security Patterns. Best Practices and Strategies for J2EE, Web Services, and Identity Management
Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
ISBN: 0131463071
EAN: 2147483647
Year: 2005
Pages: 204

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net