|
[1] 中華民國政府憑證管理中心,”政府憑證管理中心憑證實作準則,” 1998. [2] 何寬瑞,黃宗立,”安全網路系統之金鑰分配設計與實作,”國立成功大學 資訊工程學系碩士班碩士論文, 1997.[3] VeriSign, Inc.,”VERISIGN CPS-VERISIGN CERTIFICATE PRACTICE STATEMENT,” 1997 [4] ITU-T, Recommendation X.509,”The Directory-Authentication Framework,” International Telecommunication Union, 1997. [5] ITU-T, Recommendation X.500,”Information technology-Open Systems Interconnection-The Directory:Overview of Concepts, Models, and Services,” International Telecommunication Union, 1993. [6] W. Yeong, T. Howes, S. Kille,”Lightweight Directory Access Protocol”, RFC 1777, March 1995. [7] RSA Data Security Inc. ,”RSA Encryption Standard Version 1.5,” PKCS#1, November 1993. [8] [9] PKI TWG 96, Federal Public Key Infrastructure (PKI) Technical Specifications (Version 1) Part A: Requirements, Jan. 1996, pp.3-5 [10] Key Train Crop. <http://140.138.151.105>1999 [11] C. Adams and S. Farrell, Internet X.509 Public Key Infrastructure Certificate Management Protocols, RFC 2510, Mar. 1999 [12] ITU-T, Recommendation X.208,”Specification of Abstract Syntax Notation One,” (ASN.1), International Telecommunication Union, 1998. [13] R.Rivest, A.Shamir, and L. Adleman,”A Method for Obtaining Digital Signatures and Public-Key Cryptosystems,” Communication of the ACM, V.21, n.2, Feb 1978, pp.120-126. [14] T. Hwang, K-R Her, J-H Chen and C-H Lin,”NISI Technical Report”, July 1997. [15] CCITT X.500 Series (1992) | ISO/IEC 9594,1--9, Information Technology -- Open Systems Interconnection -- The Directory, 1992.
|