25.07.2013 Views

Zaštita podataka primenom kriptografskih metoda - Univerzitet u Nišu

Zaštita podataka primenom kriptografskih metoda - Univerzitet u Nišu

Zaštita podataka primenom kriptografskih metoda - Univerzitet u Nišu

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Zaštita</strong> <strong>podataka</strong> <strong>primenom</strong> <strong>kriptografskih</strong> <strong>metoda</strong> Literatura<br />

[23] William Stalings, “Cryptography and Network Security Principles and Practices", Book Prentice<br />

Hall, ISBN 100131873164, 4 th edition, London, Nov. 2005, pp. 298<br />

[24] http://www.pgpi.org/doc/pgpintro/#p10, 2009.<br />

[25] Behrouz A. Forouzan, “Data Communications and Networking“, Book Mc Graw Hill, ISBN<br />

9780072967753, 4 th edition, 2007.<br />

[26] http://www.freesoft.org/CIE/RFC/1321/3.htm, 2009.<br />

[27] http://en.wikipedia.org/wiki/MD5, 2009.<br />

[28] Brown K., Kaufman C, et al., “Web Service Security Guide“, Microsoft patern and practies,<br />

MS_WSS_Dec_05.pdf, 2007. (http://www.microsoft.com/downloads/details.aspx-<br />

?FamilyId=3E02A6C8-128A-47C2-9F39-4082582F3FE1&displaylang=en)<br />

[29] Spasić Dragan, “Elektronsko potpisivanje korišćenjem digitalnih sertifikata sertifikacionog tela<br />

pošte“, JP PTT saobraćaja Srbije, Beograd.<br />

[30] http://www3.ptt.rs/help_desk/zastita.php?id=sertifikati, 2009.<br />

[31] C. Adams, S. Ferrell, “Internet X.509 Public Key Infrastructure”, IETF RFC 2510, 1999.<br />

(http://tools.ietf.org/html/rfc2510),<br />

[32] Jean-Yves Migeon, “The MIT Kerberos Administrators How-to Guide”, MIT Kerberos<br />

Consortium, Ver. 1., July 2008,<br />

[33] Thomas Hardjono, “Why is Kerberos a credible security solution?”, MIT Kerberos Consortium,<br />

Dec 2008. (http://www.kerberos.org/software/whitepapers.html)<br />

[34] http://bazzz84.wordpress.com/2009/03/06/ipsec-internet-protocol-security/, 2010<br />

[35] http://www.scribd.com/doc/24344342/SSL-PROTOKOL-TRANSPORTNI-SLOJ, 2010<br />

[36] Joseph Migga Kizza, “A Guide to computer Network Security”, University of Tennessee-<br />

Chattanooga, ISBN 9781848009165, London, 2009.<br />

66

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!