References

[AV99] Ashley, P. and M. Vandenwauver. Practical Intranet Security: Overview of the State of the Art and Available Technologies. Boston: Kluwer Academic Publishers, 1999.

[DCE] The Open Group. DCE Today. Upper Saddle River, NJ: Prentice Hall, 1998.

[HS91] Haber, S. and W.S. Stornetta. "How To Time-Stamp a Digital Document." Journal of Cryptology 3.2 (1991): 99–208;111.

[RFC1305] Mills, D. "Network Time Protocol (Version 3): Specification, Implementation, and Analysis." Internet Request for Comments 1305. (March 1992).

[RFC1510] Kohl, J. and C. Neuman. "The Kerberos Network Authentication Service (V5)." Internet Request for Comments 1510. (September 1993).

[RFC2025] Adams, C. "The Simple Public-Key GSS-API Mechanism (SPKM)." Internet ...

Get Understanding Public-Key Infrastructure: Concepts, Standards, and Deployment Considerations now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.