Bibliography
AGRA04 Agrawal, M., Kayal, N., Saxena, N., “PRIMES is in P”, Annals of Mathematics, Vol. 160 #2, September 2004, pp. 781–793.
ALAG93 Alagappan, K., Telnet Authentication: SPX, RFC 1412, January 1993.
BALE85 Balenson, D., “Automated Distribution of Cryptographic Keys Using the Financial Institution Key Management Standard”, IEEE Communications, Vol. 23 #9, September 1985, pp. 41–46.
BALE93 Balenson, D., Privacy Enhancement for Internet Electronic Mail: Part III: Algorithms, Modes, and Identifiers, RFC 1423, February 1993.
BELL74 Bell, D. E. and LaPadula, L. J., Secure Computer Systems: Mathematical Foundations and Model, M74-244, Mitre Corp., October 1974.
BELL90 Bellovin, S. M. and Merritt, M., “Limitations of the Kerberos Authentication ...
Get Network Security: Private Communications in a Public World, 3rd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.