|
壹、中文部分 郭強毅、洪國寶(2000)。Creating Secure Session Key Using Weak Passwords。第十屆全 國資訊安全會議論文集,367-373。 賴溪松、韓亮、張真誠(1995)。近代密碼學及其應用。松崗電腦圖書資料股份有限公 司。 貳、英文部分 Andrew, S. T. (1996). Computer Networks(3rd ed). Prentice Hall. Biham, E. and Shamir, A. (1991). Differential cryptanalysis of DES-like cryptosystems. Journal of Cryptology, 4(1), 3-72. Bellovin, S. and Merritt, M. (1992). Encrypted key exchange:password-based protocols secure against dictionary attack. IEEE Symposium on Research in Security and Privacy, 72-84. Chang, H. C. and Shung, C. B. (1998). A (208,192;8) Reed-Solomon decoder for DVD application. IEEE International Conference, 2, 957-960. Diffie, W. and Hellman, M. E. (1976). New Directions in Cryptography. IEEE Transactions on Information Theory, 644-654. Daeman, J. and Rijmen, V. (1999). AES Proposal: Rijndael. Document Version 2. Dierks, T. and Allen, C. (1999). The TLS Protocol Version 1.0. RFC2246. Eastlake, D., Crocker, S., and Schiller, J. (1994). Randomness Recommendations for Security. RFC1750 Frier, A., Karlton, P., and Kocher, P. (1996). The SSL 3.0 Protocol. Netscape Communication Corporation. Retrieved June 25, 2002, from http://wp.netscape.com/eng/ssl3/ Housley, R., Ford, W., Polk, W., and Solo, D. (1999). Internet X.509 Public Key Infrastructure Certificate and CRL Profile. RFC2459. Jablon, D. (1996). Strong Password-Only Authentication Key Exchange. Computer Communication Review, 26(5), 5-26. 58 Kwon, T. and Song, J. (1999). Secure Agreement Scheme for gxy Via Password Authentication. Electronics Letters, 35(11), 892-893. Menezes, A. J., Oorschot, P. C. V., and Vanstone, S. A. (1996). Handbook of Applied Cryptography. Florida, CRC Press. Medvinsky, A. and Hur, M. (1999). Addition of Kerberos Cipher Suites to Transport Layer Security(TLS). RFC2712. Rivest, R. (1992). The MD5 Message Digest Algorithm. RFC1321. Stephen, B. W. (1995). Error Control Systems for Digital Communication and Storage. Prentice Hall, Inc. Stallings, W. (1999). Cryptography and Network security:principles and practice (2nd ed.). Prentice Hall, Upper Saddle River, New Jersey. Wagner, D. and Schneier, B. (1996). Analysis of the SSL 3.0 Protocol. Retrieved June 25, 2002, from http://www.counterpane.com/ssl.html
|