Página siguiente Página anterior Índice general

11. Referencias

  1. [EFF98]

    Electronic Frontier Foundation.
    Cracking DES: Secrets of Encryption Research, Wiretap Politics, and Chip Design .
    O'Reilly & Associates, 1998.

  2. [FEGHHI99]

    Feghhi, Jalal; Feghhi, Jalil; Williams, Peter.
    Digital Certificates: applied Internet Security.
    Addison Wesley, 1999.

  3. [DAGEFO99]

    Dageforde, Mary.
    The Java Tutorial: Security in JDK 1.2.
    24 Noviembre, 1999, http://java.sun.com/docs/books/tutorial/security1.2/.

  4. [GONGLI99]

    Gong, Li.
    JavaTM Security Architecture (JDK 1.2).
    2 Octubre, 1998, ftp://ftp.javasoft.com/docs/jdk1.2/security-spec.pdf.

  5. [RFC_2246]

    Dierks, T.; Allen, C..
    RFC 2246: The TSL Protocol Version 1.0.
    Enero 1999, http://sunsite.org.uk/rfc/rfc2246.txt.

  6. [RSALab98]

    RSA Data Security, Inc.
    RSA Laboratories' Frequently Asked Questions About Today's Cryptography, v 4.0.
    1998, http://www.rsa.com/rsalabs/faq/.

  7. [SCHNEI96]

    Schneier, Bruce.
    Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd. Edition.
    John Wiley & Sons, 1996.


Página siguiente Página anterior Índice general