Schneier, Applied Cryptography, 2e, 1996.* |
Richard Smith, Internet Cryptography, 1997.* |
Coulouris et. al. Distributed Systems, Concepts and Design 2e, Addison-Wesley, 1994.* |
Shoffner et. al. Java and Web-Executable Object Security, Nov. 1996.* |
Grady Booch, Object-Oriented Analysis and Design with Applications 2e, Benjamin, p. 474, 1994.* |
Keefe, et. al. Soda: A Secure Object-Oriented Database System, Computers & Security 8, pp. 517-533, 1989.* |
Felten, Webware Security, Communication of the AC M, 40(4) pp. 130, Nov. 1996.* |
Stevens, TCP/IP Illustrated, vol. 1 Protocols, Addison-Wesley, p. 226, 231-233, 1994.* |
IBM Technical Disclosure Bulletin, vol. 39, No. 02, Feb. 1996, Public-Key-Based Certification Infrastructure Framework for Asynchronous Transfer Mode. |