REFERENCES

Team-Fly

  1. R. Oppliger, Security Technologies for the World Wide Web, Artech House, Norwood, MA, 2000.

  2. R. Nelson, "SDNS Services and Architecture," Proceedings of National Computer Security Conference, 1987, pp. 153–157.

  3. ISO/IEC 10736, Information Technology—Telecommunications and Information Exchange Between Systems—Transport Layer Security Protocol, Geneva, Switzerland, 1993.

  4. M. Blaze and S. M. Bellovin, "Session-Layer Encryption," Proceedings of USENIX UNIX Security Symposium, June 1995.

  5. J. Myers, "Simple Authentication and Security Layer," Request for Comments 2222, October 1997.

  6. H. Krawczyk, M. Bellare, and R. Canetti, "HMAC: Keyed-Hashing for Message Authentication," Request for Comments 2104, February 1997.

  7. D. Wagner and B. Schneier, "Analysis of the SSL 3.0 Protocol," Proceedings of 2nd USENIX Workshop on Electronic Commerce, November 1996, pp. 29–40.

  8. D. Bleichenbacher, "Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS #1," Proceedings of CRYPTO '98, August 1998, pp. 1–12.

  9. RSA Data Security, Inc., PKCS #1: RSA Encryption Standard, Redwood City, CA, November 1993.

  10. M. Bellare and P. Rogaway, "Optimal Asymmetric Encryption," Proceedings of EURO-CRYPT '94, 1994, pp. 92–111.

  11. M. Bellare, et al., "Relations Among Notions of Security for Public-Key Encryption Schemes," Proceedings of CRYPTO '98, August 1998.

  12. R. Cramer and V. Shoup, "A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack," Proceedings of CRYPTO '98, August 1998, pp. 13–25.

  13. B. Kaliski and J. Staddon "PKCS #1: RSA Cryptography Specifications Version 2.0," Request for Comments 2437, October 1998.

  14. European Committee for Banking Standards (ECBS), Secure Banking over the Internet, March 1997.

  15. B. Laurie and P. Lauried, Apache: The Definitive Guide, O'Reilly & Associates, Sebastopol, CA, 1997.

  16. T. Dierks and C. Allen, "The TLS Protocol Version 1.0," Request for Comments 2246, January 1999.

  17. A. Medvinsky and M. Hur, "Addition of Kerberos Cipher Suites to Transport Layer Security (TLS)," Request for Comments 2712, October 1999.

  18. R. Khare and S. Lawrence, "Upgrading to TLS Within HTTP/1.1," Request for Comments 2817, May 2000.

  19. E. Rescorla, "HTTP over TLS," Request for Comments 2818, May 2000.

  20. A. Luotonen, Web Proxy Servers, Prentice Hall PTR, Upper Saddle River, NJ, 1998.

  21. M. Abadi, et al., "Secure Web Tunneling," Proceedings of 7th International World Wide Web Conference, April 1998, pp. 531–539.

  22. S. Mittra and T. Y. C. Woo, "A Flow-Based Approach to Datagram Security," Proceedings of ACM SIGCOMM, September 1997.


Team-Fly


Internet and Intranet Security
Internet & Intranet Security
ISBN: 1580531660
EAN: 2147483647
Year: 2002
Pages: 144

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net