Zaštita podataka primenom kriptografskih metoda - Univerzitet u Nišu
Zaštita podataka primenom kriptografskih metoda - Univerzitet u Nišu
Zaštita podataka primenom kriptografskih metoda - Univerzitet u Nišu
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
<strong>Zaštita</strong> <strong>podataka</strong> <strong>primenom</strong> <strong>kriptografskih</strong> <strong>metoda</strong> Literatura<br />
[23] William Stalings, “Cryptography and Network Security Principles and Practices", Book Prentice<br />
Hall, ISBN 100131873164, 4 th edition, London, Nov. 2005, pp. 298<br />
[24] http://www.pgpi.org/doc/pgpintro/#p10, 2009.<br />
[25] Behrouz A. Forouzan, “Data Communications and Networking“, Book Mc Graw Hill, ISBN<br />
9780072967753, 4 th edition, 2007.<br />
[26] http://www.freesoft.org/CIE/RFC/1321/3.htm, 2009.<br />
[27] http://en.wikipedia.org/wiki/MD5, 2009.<br />
[28] Brown K., Kaufman C, et al., “Web Service Security Guide“, Microsoft patern and practies,<br />
MS_WSS_Dec_05.pdf, 2007. (http://www.microsoft.com/downloads/details.aspx-<br />
?FamilyId=3E02A6C8-128A-47C2-9F39-4082582F3FE1&displaylang=en)<br />
[29] Spasić Dragan, “Elektronsko potpisivanje korišćenjem digitalnih sertifikata sertifikacionog tela<br />
pošte“, JP PTT saobraćaja Srbije, Beograd.<br />
[30] http://www3.ptt.rs/help_desk/zastita.php?id=sertifikati, 2009.<br />
[31] C. Adams, S. Ferrell, “Internet X.509 Public Key Infrastructure”, IETF RFC 2510, 1999.<br />
(http://tools.ietf.org/html/rfc2510),<br />
[32] Jean-Yves Migeon, “The MIT Kerberos Administrators How-to Guide”, MIT Kerberos<br />
Consortium, Ver. 1., July 2008,<br />
[33] Thomas Hardjono, “Why is Kerberos a credible security solution?”, MIT Kerberos Consortium,<br />
Dec 2008. (http://www.kerberos.org/software/whitepapers.html)<br />
[34] http://bazzz84.wordpress.com/2009/03/06/ipsec-internet-protocol-security/, 2010<br />
[35] http://www.scribd.com/doc/24344342/SSL-PROTOKOL-TRANSPORTNI-SLOJ, 2010<br />
[36] Joseph Migga Kizza, “A Guide to computer Network Security”, University of Tennessee-<br />
Chattanooga, ISBN 9781848009165, London, 2009.<br />
66