References


[1] Myers, J., ˜ ˜Simple Authentication and Security Layer, Request for Comments 2222, October 1997.

[2] Krawczyk, H., M. Bellare, and R. Canetti, ˜ ˜HMAC: Keyed-Hashing for Message Authentication, Request for Comments 2104, February 1997.

[3] Wagner, D., and B. Schneier, ˜ ˜Analysis of the SSL 3.0 Protocol, Proceedings of 2nd USENIX Workshop on Electronic Commerce , November 1996, pp. 29 “40.

[4] Bleichenbacher, D., ˜ ˜Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS #1, Proceedings of CRYPTO 98, August 1998, pp. 1 “12.

[5] RSA Data Security, Inc., PKCS #1: RSA Encryption Standard , Redwood City, CA, November 1993.

[6] Bellare, M., and P. Rogaway, ˜ ˜Optimal Asymmetric Encryption, Proceedings of EUROCRYPT 94, 1994, pp. 92 “111.

[7] Bellare, M., et al., ˜ ˜Relations Among Notions of Security for Public-Key Encryption Schemes, Proceedings of CRYPTO 98, August 1998.

[8] Cramer, R., and V. Shoup, ˜ ˜A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack, Proceedings of CRYPTO 98, August 1998, pp. 13 “25.

[9] Kaliski, B., and J. Staddon, ˜ ˜PKCS #1: RSA Cryptography Specifications Version 2.0, Request for Comments 2437, October 1998.

[10] Manger, J., ˜ ˜A Chosen Ciphertext Attack on RSA Optimal Asymmetric Encryption Padding (OAEP) as Standardized in PKCS#1 v2.0, Proceedings of CRYPTO 01, August 2001, pp. 230 “238.

[11] Laurie, B., and P. Lauried, Apache: The Definitive Guide , Sebastopol, CA: O Reilly & Associates, 1997.

[12] Dierks, T., and C. Allen, ˜ ˜The TLS Protocol Version 1.0, Request for Comments 2246, January 1999.

[13] Abadi, M., et al., ˜ ˜Secure Web Tunneling, Proceedings of 7th International World Wide Web Conference , April 1998, pp. 531 “539.

[14] Medvinsky, A., and M. Hur, ˜ ˜Addition of Kerberos Cipher Suites to Transport Layer Security (TLS), Request for Comments 2712, October 1999.

[15] Khare, R., and S. Lawrence, ˜ ˜Upgrading to TLS Within HTTP/1.1, Request for Comments 2817, May 2000.

[16] Rescorla, E., ˜ ˜HTTP over TLS, Request for Comments 2818, May 2000.

[17] Gilmore, C., D. Kormann, and A. D. Rubin, ˜ ˜Secure Remote Access to an Internal Web Server, Proceedings of ISOC Symposium on Network and Distributed System Security , February 1999.

[18] Mittra, S., and T. Y. C. Woo, ˜ ˜A Flow-Based Approach to Datagram Security, Proceedings of ACM SIGCOMM , September 1997.




Security Technologies for the World Wide Web
Security Technologies for the World Wide Web, Second Edition
ISBN: 1580533485
EAN: 2147483647
Year: 2003
Pages: 142
Authors: Rolf Oppliger

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net