- 1 Secure Hash Standard, FIPS-180-1, National Institute of Standards and Technology, U.S. Department of Commerce, April 1995.]]Google Scholar
- 2 J. Gosling, B. Joy, and G. Steele, The Java Language Specification. 1996: Addison-Wesley.]] Google ScholarDigital Library
- 3 J.W. Moore, "The Use of Encryption to Ensure the Inbtegrity of Reusable Software Components", international Conference on Software Reuse. Nov. 1994, Rio de Janeiro, pp. 118-123.]]Google Scholar
- 4 R. Motwani and P. Raghavan, Randomized Algorithms. 1995: Cambridge University Press.]] Google ScholarDigital Library
- 5 D.D. Redell, Y. K. Dalal, T. R. Horsley, H. C. Lauer, W. C. Lynch, P. R. McJones, H. G. Murray, and S. C. Purcell, "Pilot: An Operating System for a Personal Computer", Communications of the A CM, Feb 1980. 23(2), pp. 81-92.]] Google ScholarDigital Library
- 6 R. L. Rivest, The MD5 Message-Digest Algorithm, RFC 132 i, Network Working Group, April 1992.]] Google ScholarDigital Library
- 7 J. D. Touch, "Performance Analysis of MD5", SIGCOMM. Aug 1995, Cambridge, MA, pp. 77-86.]] Google ScholarDigital Library
- 8 A. van der Hoek, R. S. Hall, D. Heimbiger, and A. L. Wolf, Software Release Management, CU-CS-806-96, University of Colorado, Aug. 1996.]]Google Scholar
Index Terms
- Using content-derived names for configuration management
Comments