9. BIBLIOGRAFIA
[1] J.Seberry and J. Pieprzyk "Cryptography: an introduction to computer security", New York, Prentice Hall, 1989
[2] D.R.Stinson "Cryptography: Theory and Practice", New York, London and Tokyo, CRC Press, 1995
[3] A.Salomaa "Public-Key Cryptography", Springer-Verlag,1990
[4] F.J.Cooper, C.Gaggans and L. Morgan "Implementing Internet Security", Indianapolis, New Riders Publishing,1995
[5] Lincoln D.Stein "Web Security: a step by step reference guide", U.S.A. and Canada, Addison-Wesley, 1998
[6] A. J. Menezes, S. A. Vanstone and P.C. van Oorschot, J. K. Halvey, L. Hughes, K. Siyan, W. Stallings and P. Stephenson "Handbook of Applied Cryptography", New York, London and Tokyo, CRC Press,1998
[7] R. Morris and K. Thompson "Password Security: a case history", Communication of the ACM, Vol. 22 - Number 11, Nov.1979, pp. 594-597.