Setting up a secure Web server and clients on an intranet
暂无分享,去创建一个
[1] Eric Rescorla,et al. The Secure HyperText Transfer Protocol , 1999, RFC.
[2] Dan S. Wallach,et al. Web Spoofing: An Internet Con Game , 1997 .
[3] Christopher Allen,et al. The TLS Protocol Version 1.0 , 1999, RFC.
[4] Hugo Krawczyk,et al. Keying Hash Functions for Message Authentication , 1996, CRYPTO.
[5] Bruce Schneier,et al. Analysis of the SSL 3.0 protocol , 1996 .
[6] Roy T. Fielding,et al. Hypertext Transfer Protocol - HTTP/1.1 , 1997, RFC.
[7] Joos Vandewalle,et al. How role based access control is implemented in SESAME , 1997, Proceedings of IEEE 6th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises.
[8] Ian Goldberg,et al. Randomness and the Netscape browser , 1996 .
[9] Scott Oaks,et al. Java Security , 1998 .
[10] Bruce Schneier,et al. Minimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security. A Report by an Ad Hoc Group of Cryptographers and Computer Scientists , 1996 .
[11] Roy T. Fielding,et al. Hypertext Transfer Protocol - HTTP/1.0 , 1996, RFC.