Additional Resources

For more information about cryptography, see the following publications:

  • Applied Cryptography: Protocols, Algorithms, and Source Code in C by B. Schneier, 1995, New York: John Wiley & Sons.

  • Internet Cryptography by R. E. Smith, 1997, Reading: Addison-Wesley.

For more information about public key technology and security on intranets and the Internet, refer to the following publications:

  • Web Security & Commerce by S. Garfinkel and G. Spafford, 1997, Sebastopol: O'Reilly & Associates.

  • Secure Electronic Commerce: Building the Infrastructure for Digital Signatures and Encryption by W. Ford and M. S. Baum, 1997, Upper Saddle River: Prentice Hall PTR.

  • Understanding Digital Signatures: Establishing Trust over the Internet and Other Networks by G. L. Grant, 1997, New York: McGraw-Hill.

  • Digital Certificates: Applied Internet Security by Jalal Feghhi, Jalil Feghhi, and P. Williams, 1998, Reading: Addison-Wesley.

  • See the Internet Engineering Task Force (IETF) link on the Web Resources page at .