Научная литература
booksshare.net -> Добавить материал -> Криптография -> Венбо Мао -> "Современная криптография" -> 302

Современная криптография - Венбо Мао

Венбо Мао Современная криптография. Под редакцией Клюшиной Д.А. — М. : Издательский дом Вильямс, 2005. — 768 c.
ISBN 5-8459-0847-7
Скачать (прямая ссылка): sovremennaya_kriptografiya.djvu
Предыдущая << 1 .. 296 297 298 299 300 301 < 302 > 303 304 305 306 307 308 .. 311 >> Следующая

127] S. Goldwasser, S. Micali, and R. L. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal of Computing, 17(2):28l-308, 1988.
128] S. Goldwasser, S. Micali, and P. Tong. Why and how to establish a private code on a public network. In Proceedings of 23rd Annual IEEE Symposium on Foundations of Computer Science, pages 134-144, 1982.
129] D. Gollmann. Computer Security. John Wiley & Sons, Inc., 1999. ISBN: 0-471-97884-2.
130] D. Gollmann. Authentication — myths and misconceptions. Progress in Computer Science and Applied Logic, 20:203-225,2001. Birkhauser Verlag Basel/Switzerland.
131] L. Gong, R. Needham, and R. Yahalom. Reasoning about belief in cryptographic protocols. In Proceedings of the 1990 IEEE Symposium on Research in Security and Privacy, pages 234-248. IEEE Computer Society Press, 1990.
132] F. T. Grampp and R. H. Morris. Unix operating system security. AT&T Bell Laboratories Technical Journal, 63(8): 1649-1672, October 1984.
133] C. G. Gunther. An identity-based key-exchange protocol. In J.-J. Quisquater and J. Vanderwalle, editors, Advances in Cryptology — Proceedings of EUROCRYPT' 89, Lecture Notes in Computer Science 434, pages 29-37. Springer-Verlag, 1990.
134] N. M. Haller. The S/KEY one-time password system. In Proceedings of the Symposium on Network and Distributed System Security, pages 151-157, 1994.
[135] D. Harkins and D. Carrel. The Internet key exchange protocol (IKE). The Internet Engineering Task Force Request For Comments (IETF RFC) 2409, November 1998. Available at www. ietf. org/rf c/rf c2409. txt.
[136] К. E. B. Hickman. The SSL Protocol. Online document, Feburary 1995. Available at www.netscape.com/eng/security/SSL_2.html.
742
Библиография
[137] С. A. R. Hoare. Communicating sequential processes. Communications of the ACM, 21(8), 1978.
[138] C. A. R. Hoare. Communicating Sequential Processes. Prentice-Hall International, 1985. Series in Computer Science.
[139] P. Hofrnan. Features of proposed successors to IKE. INTERNET-DRAFT, draft-ietf-ipsec-soi-features-01.txt, May 2002.
[140] R. Housley and P. Hoffman. Internet X.509 Public Key Infrastructure Operational Protocols: FTP and HTTP. The Internet Engineering Task Force Request For Comments (IETF RFC) 2585, August 2001. Available at www.ietf.org/ rfc/rfc2585.txt.
[141] D. Huhnlein, M. Jakobsson, and D. Weber. Towards practical non-interactive public key cryptosystems using non-maximal imaginary quadratic orders. In Prodeedings of Selected Areas of Cryptography — SAC 2000, Lecture Notes in Computer Science 2012, pages 275-287. Springer-Verlag, 2000.
[142] ISO/IEC. Information Processing — Modes of operation for an и-bit block cipher algorithm. International Organization for Standardization and International Electro-technical Commission, 1991. 10116.
[143] ISO/IEC. Information Technology — Security Techniques — summary of voting on letter ballot No.6, Document SC27 N277, CD 9798-3.3 "Entity Authentication Mechanisms" — Part 3: Entity authentication mechanisms using a public key algorithm. International Organization for Standardization and International Electro-technical Commission, October 1991. ISO/IEC JTC 1/SC27 N313.
[144] ISO/IEC. Information Technology — Security Techniques — Entity Authentication Mechanisms — Part 2: Entity authentication using symmetric techniques. International Organization for Standardization and International Electro-technical Commission, 1992. ISO/IEC JTC 1/SC 27 N489 CD 9798-2, 1992-06-09.
[145] ISO/IEC. Information Technology — Security Techniques — Entity Authentication Mechanisms — Part 2: Entity authentication using symmetric techniques. International Organization for Standardization and International Electro-technical Commission, 1993. ISO/IEC JTC 1/SC 27 N739 DIS 9798-2, 1993-08-13.
[146] ISO/IEC. Information Technology — Security Techniques — Entity Authentication — Part 1: General. Internationa] Organization for Standardization and International Electro-technical Commission, 1996. ISO/IEC JTC 1/SC 27 DIS 9798-1:1996 (E).
[147] ISO/IEC. Information Technology — Security Techniques — Entity Authentication — Part 2: Mechanisms using symmetric encipherment algorithms. Internationa] Organization for Standardization and International Electro-technical Commission, December 1998. ISO/IEC JTC 1/SC 27 N2145 FDIS 9798-2.
Библиография
743
[148] ISO/IEC. Information Technology — Security Techniques — Entity Authentication — Part 3: Mechanisms using digital signature techniques. International Organization for Standardization and International Electro-technical Commission, October 1998. BS ISO/IEC 9798-3.
[149] ISO/IEC. Information Technology — Security Techniques — Entity Authentication — Part 4: Mechanisms using a cryptographic check function. International Organization for Standardization and International Electro-technical Commission, April 1999. ISO/IEC JTC 1/SC 27 N2289 FDIS 9798-4.
[150] ISO/IEC. Information technology — Security techniques — Digital signature schemes giving message recovery — Part 3: Discrete logarithm based mechanisms. International Organization for Standardization and International Electro-technical Commission, April 2000. ISO/IEC JTC 1/SC 27 9796-3.
Предыдущая << 1 .. 296 297 298 299 300 301 < 302 > 303 304 305 306 307 308 .. 311 >> Следующая

Реклама

c1c0fc952cf0704ad12d6af2ad3bf47e03017fed

Есть, чем поделиться? Отправьте
материал
нам
Авторские права © 2009 BooksShare.
Все права защищены.
Rambler's Top100

c1c0fc952cf0704ad12d6af2ad3bf47e03017fed