|
[01] IETF, "Lightweight Directory Access Protocol," RFC 1777, March 1995. [02] IETF, "Lightweight Directory Access Protocol (v3)," RFC 2251, December 1997. [03] ITU-T, "ITU-T Recommendation X.509: The Directory-Public-key and attribute certificate frameworks," March 2000. [04] IETF, "Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile," RFC 3280, April 2002 [05] IETF, "Internet X.509 Public Key Infrastructure Certificate Management Protocols," RFC 2510, March 1999. [06] Ravi S. Sandhu and Edward J. Coyne and Hal L. Feinstein, "Role-based access control models," IEEE Computer, vol. 29, 1996, pp. 38-47. [07] IETF, "Internet X.509 Public Key Infrastructure Certificate Policy and Certification Practices Framework," RFC 2527, March 1999. [08] IETF, "Internet X.509 Public Key Infrastructure Qualified Certificates Profile," RFC 3039, January 2001. [09] A.O. Freier, P. Karlton, and P.C. Kocher, "The SSL Protocol version 3.0," Netscape Communication Corp, March 1996. [10] IETF, "The TLS Protocol Version 1.0," RFC 2246, January 1999. [11] Bruce Schneier, Applied Cryptography 2nd edition, John Wiley & Sons, Inc., 1996. [12] A.J. Menezes, P.C.V. Oorschot and S.A. Vanstone, Handbook of Applied Cryptography, CRC Press, 1996. [13] D.R. Stinson, Cryptography - Theory and Pratice 2nd Edition, CRC Press, March 2002. [14] S. Goldwasser and M. Bellare, Lecture Notes on Cryptography, http://www-cse.ucsd.edu/users/mihir. [15] W. Diffie and M. Hellman, "New directions in cryptography," IEEE Transactions on Information Theory, v. 22, pp. 644-654,1976. [16] Certicom White Paper , "Elliptic Curve Cryptosystems," http://www.certicom.com. [17] NIST, "DES Modes of Operation," NIST FIPS PUB 81, December 1980. [18] NIST, "Recommendation for Block Cipher Modes of Operation - Methods and Techniques," NIST SP 800-38a, 2001 Edition. [19] NIST, "NIST Recommendation for Mode," http://csrc.nist.gov/encryption/modes/index.html [20] NIST, "Computer Data Authentication," NIST FIPS PUB 113, May 1985. [21] M. Bellare, R. Canetti, and H. Krawczyk, "Keying Hash Functions for Message Authentication," Advances in Cryptology-CRYPTO''96, pp. 1-15, Springer-Verlag, 1996. [22] D.W. Chadwick, Understanding X.500 (The Directory), Chapman and Hall, June 1994. [23] ITU, "ITU-T Recommendation X.509: Specification of Basic Encoding Rules for Abstract Syntax Notation One (ASN.1)," November 1988. [24] IETF, "Lightweight Directory Access Protocol (v3): UTF-8 String Representation of Distinguished Names," RFC 2253, December 1997. [25] IETF, "Using Domains in LDAP Distinguished Names," RFC 2247, January 1998. [26] IETF, "Naming Plan for Internet Directory-Enabled Applications," RFC 2377, September 1998. [27] IETF, "File Transfer Protocol," STD 0009, October 1985. [28] IETF, "Hypertext Transfer Protocol HTTP/1.1," RFC 2616, June 1999. [29] ITU, "ITU-T Recommendation X.691: Information technology - ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)," November 1997. [30] ITU, "ITU-T Recommendation X.691: Information technology - Open Systems Interconnection - The Directory: Models," February 2001. [31] IETF, "SPKI Requirements," RFC 2692, September 1999. [32] IETF, "SPKI Certificate Theory," RFC 2693, September 1999. [33] ANSI, "Public Key Cryptography for the Financial Services Industry - Certificate Management," ANSI X9.57, March 1997. [34] IETF, "HMAC: Keyed-Hashing for Message Authentication," RFC 2104, February 1997. [35] Y.S. Yeh, W.S. Lai, and C.J. Cheng, Applying lightweight directory access protocol service on session certification authority, Computer Networks, v. 38, i. 5, pp. 675-692, April, 2002. [36] World Wide Web Consortium, W3C Recommendation: Extensible Markup Language (XML) 1.0 (Second Edition), http://www.w3.org/TR/2000/REC-xml-20001006.pdf [37] Y.S. Yeh, W.S. Lai, I-T Chen, "An N-D Cryptoscheme," Journal of Information and Optimization Sciences, v. 23, n. 1, pp. 19-36, 2002. [38] Y.S. Yeh and C.C. Wang, "Construct Message Authentication Code with One-Way Hash Functions and Block Ciphers," IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, v. E82-A, No. 2, pp. 390-393, February 1999. [39] NIST, "Secure Hash Standard (SHS)," NIST FIPS 180-1, April 1995. [40] NIST, "Secure Hash Standard (SHS)," NIST FIPS Draft 180-2, May 2001. [41] NIST, "Advanced Encryption Standard (AES)," NIST FIPS PUB 197, November 2001. [42] Y.S. Yeh, C.H. Lain, and W.S. Lai, "Construct Message Authentication Code with SHA and AEA," Journal of Discrete Mathematical Sciences and Cryptography. (accepted on April 2002) [43] Y.S. Yeh and W.S. Lai, "The Design of Authenticated TELNET Protocol to Enhance Cryptography and Security," Malaysian Journal of Computer Sciences, v. 15, n. 1, June 2002. (accepted) [44] IETF, "Telnet Protocol Specification," RFC 854, May 1983. [45] IETF, "Telnet Option Specifications," RFC 855, May 1983. [46] IETF, "XDR: External Data Representation Standard," RFC 1832, August 1995.
|