9. BIBLIOGRAFIA

[1]  J.Seberry and J. Pieprzyk  "Cryptography: an introduction to computer security",  New York, Prentice Hall, 1989

[2]  D.R.Stinson  "Cryptography: Theory and Practice",  New York, London and Tokyo, CRC Press, 1995

[3]  A.Salomaa  "Public-Key Cryptography",  Springer-Verlag,1990

[4]  F.J.Cooper, C.Gaggans and L. Morgan  "Implementing Internet Security",  Indianapolis, New Riders Publishing,1995

[5]  Lincoln D.Stein  "Web Security: a step by step reference guide", U.S.A. and Canada, Addison-Wesley, 1998

[6]  A. J. Menezes, S. A. Vanstone and P.C. van Oorschot, J. K. Halvey, L. Hughes, K. Siyan, W. Stallings and P. Stephenson "Handbook of Applied Cryptography",  New York, London and Tokyo, CRC Press,1998

[7] R. Morris and K. Thompson  "Password Security: a case history", Communication of the ACM,  Vol. 22 - Number 11, Nov.1979, pp. 594-597.