SP 800-52. Guidelines for the Selection and Use of Transport Layer Security (TLS) Implementations
暂无分享,去创建一个
[1] Russell Housley,et al. Planning for PKI: Best Practices Guide for Deploying Public Key Infrastructure , 2001 .
[2] Eric Rescorla,et al. SSL and TLS: Designing and Building Secure Systems , 2000 .
[3] William M. Daley,et al. Security Requirements for Cryptographic Modules , 1999 .
[4] Pete Chown,et al. Advanced Encryption Standard (AES) Ciphersuites for Transport Layer Security (TLS) , 2002, RFC.
[5] Edward Roback,et al. SP 800-23. Guidelines to Federal Organizations on Security Assurance and Acquisition/Use of Tested/Evaluated Products , 2000 .
[6] Timothy Grance,et al. Guide to Selecting Information Technology Security Products , 2003 .
[7] Christopher Allen,et al. The TLS Protocol Version 1.0 , 1999, RFC.
[8] Vinton G. Cerf,et al. Internet Core Protocols: The Definitive Guide with Cdrom , 1999 .
[9] Charles Adams,et al. Understanding Public-Key Infra-structure: Concepts, Standards, and Deployment Con-siderations , 1999 .
[10] J. C. Tressler,et al. Fourth Edition , 2006 .
[11] Carlisle Adams,et al. Understanding PKI: Concepts, Standards, and Deployment Considerations , 1999 .
[12] Eric A. Hall,et al. Internet core protocols : the definitive guide , 2000 .
[13] Scott Hollenbeck,et al. Transport Layer Security Protocol Compression Methods , 2004, RFC.
[14] Douglas E. Comer,et al. Internetworking with TCP/IP, Volume 1: Principles, Protocols, and Architectures, Fourth Edition , 2000 .
[15] D. Richard Kuhn,et al. SP 800-32. Introduction to Public Key Technology and the Federal PKI Infrastructure , 2001 .
[16] William T. Polk,et al. Public Key Infrastructures that Satisfy Security Goals , 2003, IEEE Internet Comput..