메뉴 건너뛰기




Volumn , Issue , 2004, Pages 1-158

Java Cryptography Extensions: Practical Guide for Programmers

(1)  Weiss, Jason a  

a NONE

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84995393679     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1016/B978-0-12-742751-5.X5008-7     Document Type: Book
Times cited : (10)

References (26)
  • 1
    • 85144133629 scopus 로고    scopus 로고
    • Java Cryptography Architecture API Specification & Reference
    • http://www.java.sun.com/j2se/1.4.2/docs/guide/security/CryptoSpec.html Java Cryptography Architecture API Specification & Reference
  • 2
    • 85144139967 scopus 로고    scopus 로고
    • Using the BootClasspath http://www.javageeks.com/Papers/BootClasspath/BootClasspath.pdf
  • 3
    • 85144145911 scopus 로고    scopus 로고
    • Java Extensions FAQ http://www.java.sun.com/products/jdk/1.2/docs/guide/extensions/ext_faq.html
  • 5
    • 85144138986 scopus 로고    scopus 로고
    • Java Cryptography Extension Reference Guide http://www.java.sun.com/j2se/1.4.2/docs/guide/security/jce/JCERefGuide.html
  • 6
    • 84995460637 scopus 로고
    • “Discrete Mathematics”
    • Section 4.1
    • J. Grossman Jerrold (1990) “Discrete Mathematics”. The Idea of an Algorithm 219. Section 4.1
    • (1990) The Idea of an Algorithm , pp. 219
    • Grossman, J.1
  • 9
    • 85009500145 scopus 로고    scopus 로고
    • “Applied Cryptography”
    • Section 14.3
    • B. Schneier Bruce (1996) “Applied Cryptography”. Blowfish 336. Section 14.3
    • (1996) Blowfish , pp. 336
    • Schneier, B.1
  • 11
    • 84995460624 scopus 로고    scopus 로고
    • “Applied Cryptography”
    • Section 3.2
    • B. Schneier Bruce (1996) “Applied Cryptography”. Authentication 52. Section 3.2
    • (1996) Authentication , pp. 52
    • Schneier, B.1
  • 12
    • 84995435676 scopus 로고    scopus 로고
    • “Applied Cryptography”
    • Section 9.3
    • B. Schneier Bruce (1996) “Applied Cryptography”. Cipher Block Chaining Mode 194. Section 9.3
    • (1996) Cipher Block Chaining Mode , pp. 194
    • Schneier, B.1
  • 13
    • 63049097086 scopus 로고    scopus 로고
    • Password Based Encryption. http://www.rsasecurity.com/solutions/developers/whitepapers/Article3PBE.pdf
    • Password Based Encryption
  • 14
  • 16
    • 84995500902 scopus 로고    scopus 로고
    • “Practical Cryptography”
    • Section 13.4
    • N. Ferguson Niels and B. Schneier Bruce (2003) “Practical Cryptography”. RSA Defined 229. Section 13.4
    • (2003) RSA Defined , pp. 229
    • Ferguson, N.1    Schneier, B.2
  • 17
    • 84995525241 scopus 로고    scopus 로고
    • What is the AES? http://www.rsasecurity.com/rsalabs/faq/33
    • What is the AES?
  • 22
    • 84946432389 scopus 로고    scopus 로고
    • Analysis of the SSL 3.0 protocol
    • November, USENIX Press, Revised version available from
    • D. Wagner David and B. Schneier Bruce (November 1996) Analysis of the SSL 3.0 protocol. Proceedings of the Second USENIX Workshop on Electronic Commerce USENIX Press 29-40. http://www.counterpane.com Revised version available from
    • (1996) Proceedings of the Second USENIX Workshop on Electronic Commerce , pp. 29-40
    • Wagner, D.1    Schneier, B.2
  • 26
    • 84995412541 scopus 로고    scopus 로고
    • “Applied Cryptography”
    • Section 2.3
    • B. Schneier (1996) “Applied Cryptography”. One-Way Functions 29. Section 2.3
    • (1996) One-Way Functions , pp. 29
    • Schneier, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.