[1] Myers, J., ˜ ˜Simple Authentication and Security Layer, Request for Comments 2222, October 1997.
[2] Krawczyk, H., M. Bellare, and R. Canetti, ˜ ˜HMAC: Keyed-Hashing for Message Authentication, Request for Comments 2104, February 1997.
[3] Wagner, D., and B. Schneier, ˜ ˜Analysis of the SSL 3.0 Protocol, Proceedings of 2nd USENIX Workshop on Electronic Commerce , November 1996, pp. 29 “40.
[4] Bleichenbacher, D., ˜ ˜Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS #1, Proceedings of CRYPTO 98, August 1998, pp. 1 “12.
[5] RSA Data Security, Inc., PKCS #1: RSA Encryption Standard , Redwood City, CA, November 1993.
[6] Bellare, M., and P. Rogaway, ˜ ˜Optimal Asymmetric Encryption, Proceedings of EUROCRYPT 94, 1994, pp. 92 “111.
[7] Bellare, M., et al., ˜ ˜Relations Among Notions of Security for Public-Key Encryption Schemes, Proceedings of CRYPTO 98, August 1998.
[8] Cramer, R., and V. Shoup, ˜ ˜A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack, Proceedings of CRYPTO 98, August 1998, pp. 13 “25.
[9] Kaliski, B., and J. Staddon, ˜ ˜PKCS #1: RSA Cryptography Specifications Version 2.0, Request for Comments 2437, October 1998.
[10] Manger, J., ˜ ˜A Chosen Ciphertext Attack on RSA Optimal Asymmetric Encryption Padding (OAEP) as Standardized in PKCS#1 v2.0, Proceedings of CRYPTO 01, August 2001, pp. 230 “238.
[11] Laurie, B., and P. Lauried, Apache: The Definitive Guide , Sebastopol, CA: O Reilly & Associates, 1997.
[12] Dierks, T., and C. Allen, ˜ ˜The TLS Protocol Version 1.0, Request for Comments 2246, January 1999.
[13] Abadi, M., et al., ˜ ˜Secure Web Tunneling, Proceedings of 7th International World Wide Web Conference , April 1998, pp. 531 “539.
[14] Medvinsky, A., and M. Hur, ˜ ˜Addition of Kerberos Cipher Suites to Transport Layer Security (TLS), Request for Comments 2712, October 1999.
[15] Khare, R., and S. Lawrence, ˜ ˜Upgrading to TLS Within HTTP/1.1, Request for Comments 2817, May 2000.
[16] Rescorla, E., ˜ ˜HTTP over TLS, Request for Comments 2818, May 2000.
[17] Gilmore, C., D. Kormann, and A. D. Rubin, ˜ ˜Secure Remote Access to an Internal Web Server, Proceedings of ISOC Symposium on Network and Distributed System Security , February 1999.
[18] Mittra, S., and T. Y. C. Woo, ˜ ˜A Flow-Based Approach to Datagram Security, Proceedings of ACM SIGCOMM , September 1997.