25.07.2013 Views

Zaštita podataka primenom kriptografskih metoda - Univerzitet u Nišu

Zaštita podataka primenom kriptografskih metoda - Univerzitet u Nišu

Zaštita podataka primenom kriptografskih metoda - Univerzitet u Nišu

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Literatura<br />

[1] Dejan Simić, “Tehnike zaštite u računarskim mrežama“, Fakultet Organizacionih Nauka<br />

Beograd, PPT Prezentacija, Beograd, Jun 2002.<br />

[2] <strong>Zaštita</strong> <strong>podataka</strong> u računarskim mrežama, MTVU lekcije, (http://www.knowledgebank1.org/poslovna_informatika_fpsvs_1_svi_06/lekcije/lekcija7.pdf),<br />

2009.<br />

[3] S. Sinkovski, B. Lučić, “Informaciona bezbednost i kriptografija“, Jugoimport SDPR Beograd,<br />

ZITEH 06-R27.pdf, 2006.<br />

[4] Dragan Spasić, “Kriptozaštita <strong>podataka</strong> u računarskim mrežama <strong>primenom</strong> simetričnih i<br />

asimetričnih kriptosistema“, Direkcija za poštanski saobraćaj,<br />

[5] Zoran Bobar, “<strong>Zaštita</strong> računarskih mreža Ministarstva odbrane i vojske srbije <strong>primenom</strong><br />

virtuelnog honeyneta“, Vojnotehnički glasnik 3/09, UDC: 004.7.056.53, Beograd, 2009<br />

[6] http://sr.wikipedia.org/sr-el/Криптографија, 2009.<br />

[7] Henk C.A. van Tilborg, “Encyclopedia of Cryptography and Security“, University of Technology<br />

Eindhoven, ISBN038723473-X, New York, 2005.<br />

[8] Fred Piper, Sean Murphy, “Cryptography: A very short Introduction“, Oxford University press,<br />

ISBN:0192803158, 2002.<br />

[9] Z. Ž. Avramović, Dražen Petrović, “Kriptografija simetrični i asimetrični algoritmi“, Seminarski<br />

rad Fakultet poslovne informatike, Banja Luka, maj 2008.<br />

[10] Behrouz A. Forouzan, Sophia Chung Fegan, “TCP/IP Protocol Suite“, Mc Graw Hill book, ISBN<br />

0071115838, 3 rd edition, New York, 2006.<br />

[11] Man Young Rhee, “Internet Security Cryptographic principles, algorithms and protocols“, School<br />

of Electrical and Computer Engineering Seoul, John Wiley & Sons ISBN 0470852852,<br />

Wiltshire, 2003.<br />

[12] http://en.wikipedia.org/wiki/Data_Encryption_Standard, 2009.<br />

[13] http://www.rsa.com/rsalabs/node.asp?id=2100, 2009.<br />

[14] http://en.wikipedia.org/wiki/International_Data_Encryption_Algorithm, 2009.<br />

[15] Ronald L. Rivest, “The RC5 Encryption Algorithm“, MIT Laboratory for Computer Science,<br />

Mass. 02139, Cambridge, March 1997.<br />

[16] http://en.wikipedia.org/wiki/RC5, 2009.<br />

[17] http://en.wikipedia.org/wiki/RC6, 2009.<br />

[18] Žarko Stanisavljević, “Simetrični algoritmi zaštite AES“, Nastavni materijal iz predmeta <strong>Zaštita</strong><br />

<strong>podataka</strong>, ETF Beograd, 04 AES1.pdf, Beograd, 2004. (http://rti.etf.bg.ac.yu/rti/ir4zp/materijali/index.html)<br />

[19] http://en.wikipedia.org/wiki/Advanced_Encryption_Standard, 2009.<br />

[20] http://en.wikipedia.org/wiki/Blowfish_(cipher), 2009.<br />

[21] Johannes A. Buchmann, “Introduction to Cryptography“, Technical University Dramstadt, ISBN<br />

0387950346, New York, 2002.<br />

[22] http://sr.wikipedia.org/sr-el/RSA, 2009.<br />

65

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!