References
- D.W.Davies, W.L.Price, 'Security for Computer Networks', John Wiley & Sons, New York, 2nd edition, 1989
- W.Fumy, P.Landrock, 'Principles of key management', IEEE Journal on Select- ed Areas in Communications pp. 785- 793, 1993
- Alfred J.Menezes. Paul C.van Oorschot Scott A.Vanstone, Handbook of Applied Cryptography, pp. 543-590, 1996
- R.A.Rueppel, 'Criticism of ISO CD 11166 banking key management by means of asymmetric algorithms', Proceedings of the 3rd Symposium on State and Pro- gress of Research in Cryptography, pp. 191-198. 1993
- M.Abadi, R.Needham, 'Prudent engineering practice for cryptographic Protocols', Digital Equipment Corporation, DEC SRC report #125, 1994
- R.Anderson, E.Biham, 'Robustness Principles for public key protocols', Advances in Cryptology-CRYPTO '95, LNCS 963, pp. 236-247, 1995
- S.M.Matyas, C.H.Meyer. 'Generation, distribution, and installation of Cryptographic keys', IBM Systems Journal 17. pp. 126-137, 1978
- ISO/IEC 11770-1, Information technology Security techniques-Key Management Part 1 : Framework, ISO, 1996
- IEEE P1363, Standard Specifications For Public Key Cryptography, IEEE, 2001
- ISO 10202-7. Financial transaction cards - Security architecture of financial tran saction systems using integrated circuit cards - Part 7: Key management. ISO, 1998
- Russ Housley, Tim Polk, 'Planning for PKI', Wiley Computer Publishing, New York. 2001
- NIST. Guideline for the Certification and Accreditation of Information Technology Systems, NIST Special Publication 800-37, 2003
- NIST, Key management guideline - Part 2: Best Practices for Key Management Organization. NIST Special Publication 800-57. 2003
- NIST, Guideline to Federal Organizations on security Assurance and Acquisition /Use of Tested/Evaluated Products. NIST Special Publication 800-23, 2000