4. Литература по данной теме

[1] ATM Forum Technical Committee, “B-ICI Specification, Version 2.0.”

[2] ATM Forum Technical Committee, “User-Network Interface (UNI) Specification,” Version 3.1,

September 1994.

[3] ATM Forum Technical Committee, “User-Network Interface (UNI) Signalling Specification,”

Version 4.0, April 1996.

[4] ATM Forum, “UNI Signaling 4.0 Security Addendum,”, ATM Forum BTD-CS-UNI-SEC-01.03,

October 1998.

[5] ATM Forum, “PNNI Signaling 1.0 Security Addendum,” ATM Forum BTD-CS-PNNI-SEC-01.03,

October 1998

[6] Federal Information Processing Standards Publication 46-2 (FIPS PUB 46-2), “Data Encryption

Standard (DES),” December 1993.

[7] Federal Information Processing Standards Publication 81 (FIPS PUB 81), “DES Modes of

Operation,” December 1980.

[8] Federal Information Processing Standards Publication 180-1 (FIPS PUB 108-1), “Secure Hash

Standard,” April 1995.

[9] Federal Information Processing Standards Publication 186 (FIPS PUB 186), “Digital Signature

Standard,” May 1994.

[10] [Federal Information Processing Standards Publication 188 (FIPS PUB 188), “Standard Security

Label for Information Transfer,” September 1994.

[11] IETF, “HMAC: Keyed-Hashing for Message Authentication,” RFC 2104, February 1997.

[12] IETF, “The MD5 Message Digest Algorithm,” RFC 1321, April 1992.

[13] IETF, “Privacy Enhancement for Internet Electronic Mail (PEM),” RFCs 1421-1424, February

1993.

[14] IETF, “U.S. Department of Defense Security Options for the Internet Protocol,” RFC 1108,

November 1991.

[15] ISO/IEC 9594-8, 1995 (E), Information Technology -- Open Systems Interconnection -- The

Directory: Authentication Framework.

[16] ISO/IEC 9594-8, 1995, Amendment 1: Certificate Extensions.

[17] ISO/IEC 9797, “Information Technology - Security Techniques - Data Integrity Mechanism using

a Cryptographic Check Function Employing a Block Cipher Algorithm,” 1994.

[18] ISO/IEC 10118-3, “Hash Functions - Part 3: Dedicated Hash Functions,” 1997.

[19] ITU-T Recommendation I.363, “B-ISDN ATM Adaptation Layer (AAL) Specification,” March

1993.

[20] ITU-T Recommendation I.610, “B-ISDN Operation and Maintenance Principles and Functions,”

November 1994.

[21] ITU-T Recommendation Q.2931, “B-ISDN DSS2 User-Network Interface Layer 3 Specification

for Basic Call/Connection Control,” February 1995.

[22] ITU-T Recommendation Q.2971, “B-ISDN DSS2 User-Network Interface Layer 3 Specification

for Point-to-Multipoint Call/Connection Control,” 1995.

[23] ITU-T Recommendation X.509, “The Directory: Authentication Framework,” 1993.

[24] Public Key Cryptography Standards #1 (PKCS #1), “RSA Encryption Standard,” RSA

Laboratories, Version 1.5, November 1993.

[25] ANSI X9.17, “Financial Institution Key Management (Wholesale),” April 1985, p.23.

[26] Agnew, Mullin, and Vanstone, “Improved Digital Signature Scheme Based on Discrete

Exponentiation,” Electronic Letters, Vol. 26, pp. 1024-1025, 1990.

[27] Bird, et al., “The KryptoKnight Family of Light-Weight Protocols for Authentication and Key

Distribution,” IEEE/ACM Transactions on Networking, Vol. 3, no. 1, pp. 31-41, February 1995.

[28] ETSI TCR-TR 028, “Network Aspects (NA); Security Techniques Advisory Group (STAG);

Glossary of security terminology,” 1995.

[29] Fujioka, A., et al., “ESIGN: An Efficient Digital Signature Implementation for Smart Cards,”

Proceedings of Eurocrypt ‘91, Springer-Verlag, pp. 446-457, 1991.

[30] IEEE P1363, “Standard Specifications For Public Key Cryptography,” Draft, Version 1, December 1997.

[31] IETF, “Internet Security Association and Key Management Protocol (ISAKMP),” RFC 2408,

November 1998.

[32] Miyaguchi, S., et al., “Expansion of FEAL Cipher,” NTT Review, Vol. 2, no. 6, pp. 117-127,

November 1990.

[33] Miyaguchi, S., “The FEAL Cipher Family,” Advances in Cryptology - CRYPTO ‘90, LNCS 537,

pp. 627-638, Springer-Verlag, 1991.

[34] Okamoto, T., “A Fast Signature Scheme Based on Congruential Polynomial Operations,” IEEE

Transactions on Information Theory, Vol. 36, no. 1, pp. 47-53, 1990.

[35] Schneier, B., Applied Cryptography, 2nd edition, John Wiley & Sons, 1996.

начало

Hosted by uCoz