Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
10.9 References
Stein, Lincoln, D. Web Security: A Step-by-Step Reference Guide. Boston, MA: Addison-Wesley, 1998.
“Documentation on Cryptography: Message digests and digital signatures.” http://pgp.rasip.fer.hr/pgpdoc2/pgpd2_50.html
“Public Key Digital Signatures”. 1. http://www.sei.cmu.edu/str/descriptions/pkds_body.html.
Kaeo, Marike. Designing Network Security. Indianapolis: Cisco Press, 1999.
“Frame Technology.” http://www.cs.nps.navy.mil/curricula/tracks/security/notes/chap05_33.html
“Key Distribution and Certification”. http://cosmos.kaist.ac.kr/cs441/text/keydist.htm
“MSND Library.” http://msdn.microsoft.com/library/default.asp?url=/library/en-us/security/security/key_distribution_center.asp
Ram and J. Honta. “Keeping PKI Under Lock and Key.” NetworkMagazine.com. http://www.networkmagazine.com/article/NMG20001004S0015.
“Certificates and Certificate Authorities.” http://www-no.ucsd.edu/oldsecurity/Ca.html.
Stallings, William. Cryptography and Network Security: Principles and Practice. Second Edition. Upper Saddle River NJ: Prentice Hall, 1999.
Panko, Raymond, R. Corporate Computer Security. Upper Saddle River NJ: Prentice Hall, 2004.
Rights and permissions
Copyright information
© 2005 Springer Science+Business Media, Inc.
About this chapter
Cite this chapter
(2005). Cryptography. In: Computer Network Security. Springer, Boston, MA. https://doi.org/10.1007/0-387-25228-2_10
Download citation
DOI: https://doi.org/10.1007/0-387-25228-2_10
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-20473-4
Online ISBN: 978-0-387-25228-5
eBook Packages: Computer ScienceComputer Science (R0)