Cryptography Reference
In-Depth Information
More information about digital certificates and PKIs is available, for example, in
Chapter 7 of [16] and [17-20].
References
[1]
Shirey, R., Internet Security Glossary , Request for Comments 2828, May 2000.
[2]
Dent, A.W., and C.J. Mitchell, User's Guide to Cryptography and Standards . Artech House
Publishers, Norwood, MA, 2004.
[3]
Boyd, C., and A. Mathuria, Protocols for Key Establishment and Authentication . Springer-Verlag,
New York, 2003.
[4]
Shamir, A., “How to Share a Secret,” Communications of the ACM , Vol. 22, 1979, pp. 612-613.
[5]
Ioannidis, J., and M. Blaze, “The Architecture and Implementation of Network-Layer Security
Under UNIX,” Proceedings of USENIX UNIX Security Symposium IV , October 1993, pp. 29-39.
[6]
Caronni, G., et al., “SKIP—Securing the Internet,” Proceedings of WET ICE '96 , Workshops on
Enabling Technologies: Infrastructure for Collaborative Enterprises, June 1996, pp. 62-67.
[7]
Oppliger, R., Internet and Intranet Security , 2nd edition. Artech House Publishers, Norwood,
MA, 2002.
[8]
Denning, D.E., and D.K. Branstad., “A Taxonomy for Key Escrow Encryption Systems,” Com-
munications of the ACM , Vol. 39, No. 3, March 1996, pp. 34-40.
[9]
U.S. Department of Commerce, National Institute of Standards and Technology, Escrowed
Encryption Standard , FIPS PUB 185, February 1994.
[10]
Blaze, M., “Protocol Failure in the Escrowed Encryption Standard,” Proceedings of the 2nd ACM
Conference on Computer and Communications Security , Fairfax, VA, November 1994, pp. 59-67.
[11]
Hoffman, L.J. (Ed.), Building in Big Brother: The Cryptographic Policy Debate . Springer-Verlag,
New York, 1995.
[12]
Abelson, H., et al., “The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryp-
tion,” May 1997, available at http://www.cdt.org/crypto/risks98.
[13]
Kohnfelder, L.M., “Towards a Practical Public-Key Cryptosystem,” Bachelor's thesis, Massa-
chusetts Institute of Technology, Cambridge, MA, May 1978.
[14]
ITU-T, Recommendation X.509: The Directory—Authentication Framework, 1988.
[15]
ISO/IEC 9594-8, Information Technology—Open Systems Interconnection—The Directory—Part
8: Authentication Framework , 1990.
[16]
Oppliger, R., Security Technologies for the World Wide Web , 2nd edition. Artech House Publish-
ers, Norwood, MA, 2003.
[17]
Feghhi, J., J. Feghhi, and P. Williams, Digital Certificates: Applied Internet Security . Addison-
Wesley Longman, Reading, MA, 1999.
[18]
Ford, W., and M.S. Baum, Secure Electronic Commerce: Building the Infrastructure for Digital
Signatures & Encryption , 2nd edition. Prentice Hall PTR, Upper Saddle River, NJ, 2000.
Search WWH ::




Custom Search