İNFORMASİYA TƏHLÜKƏSİZLİYİ
________________________ 392 ____________________________
безопасность. Москва • Книжный мир • 2009
Ященко В. В. Введение в криптографию. СПб.:
Питер, 2001.
Advanced Encryption Standard (AES) Development
Effort. February 2001
CSC-STD-003-85, Computer Security Requirements
Guidance for Applying the Department of Defense System
Evaluation Criteria in Specific Environments.
Daemen J., Rijmen V. AES Proposal: Rijndael.
Document version 2. September 1999
Datapro Reports on Information Security, vol.1-3,
1990-1993.
Dierks Т., Allen C. RFC 2246: The TLS Protocol Version
1.0. January 1999
DoD 5200.28-STD. Department of Defence Trusted
Computer System Evaluation Criteria (TCSEC) 1985.
Dusse S., Hoffman P., Ramsdell B. etc. RFC 2311:
S/MIME Version 2 Message Specification. March 1998
Evaluation Levels Manual, Department of Trade and
Industry, Computer Security Branch, Kingsgate House, 66-
74, V22.
FIPS Publication 197. Announcing the Advanced
Encryption Standard (AES). November, 2001
Gladny H.M.- In: Performance of Computer
Installation, Berke, 1978, Proceedings, p.151-200.
Hodges J. RFC 3377: Lightweight Directory Access
Protocol (v3): Technical Specification. September 2002 / J.
Hodges, R. Morgan
Housley R.y Ford W,Polk W. etc. RFC 2459: Internet
X.509 Public Key Infrastructure. January 1999
Interoperability Specification for ICCs and Personal
İNFORMASİYA TƏHLÜKƏSİZLİYİ
________________________ 393 ____________________________
Computer Systems. Part 8. Recommendations for ICC
Security and Privacy Devices. Revision 1.0. PC/SC
Workgroup, 1997.
ISO/IEC 14443-1 Identification Cards — Contactless
integrated circuit(s) cards Proximity Cards Part 1: Physical
characteristics International Standard. 2000.
ISO/IEC 14443-2 Identification Cards — Contactless
integrated circuit(s) cards Proximity Cards Part 2: Radio
frequency power and signal interface International
Standard. 2001.
Kent S., Atkinson R. RFC 2401: Security Architecture
for IP. November 1998.
Menezes A. /., van Oorschot P. С., Vanstone S. A.
Handbook of Applied Cryptography. CRC Press, 1999. 82.
Schneier B. Applied Cryptography. John Wiley & Sons, 1996.
Orman H. RFC 2412: The OAKLEY Key Determination
Protocol. November 1998
Paulauskas N. Computer System Attack Classification /
N. Paulauskas, E. Garšva // Electronics and Electrical
Engineering. – 2006. – № 2(66). – P. 84–87.
|