⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 bookshelf.htm

📁 g729 coding ipaddressing
💻 HTM
字号:
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV="Content-Type" Content="text/html; charset=Windows-1252">
<TITLE>Bookshelf</TITLE>
</HEAD>

<BODY BGCOLOR="#FFFFFF" TEXT="#000000">

<OBJECT TYPE="application/x-oleobject" CLASSID="clsid:1e2a7bd0-dab9-11d0-b93a-00c04fc99f9e">
	<PARAM NAME="Keyword" VALUE="References">
</OBJECT>

<h2><A NAME="bookshelf"></A>Bookshelf</h2>

The following references will help you understand the design, implementation,
and use of <i>Speak Freely</i>.

<p>

Allard, J., Keith Moore, and David Treadwell. <i>Plug into Serious Network
Programming with the Windows Sockets API</i>.  Microsoft Systems Journal,
<b>Vol 8, No 7</b>, 35, (July 1993).  Excellent introduction to the Windows
Sockets (WINSOCK) API used by <i>Speak Freely</i> for network communications.
The <b>WORMHOLE</b> sample application presented in this article provided the
model for <i>Speak Freely</i>, in particular suggesting that the Multiple
Document Interface (MDI) was an excellent way to represent multiple
simultaneous connections.

<p>

Davis, Ralph.  <i>Windows Network Programming</i>.  Reading (Mass.):
Addison-Wesley, 1993.  Documents the programming interface of a variety of
networks, including a network-independent interface module for each.  The
chapter covering the Windows Sockets (WINSOCK) API is one of the clearest
expositions of that facility I've encountered.

<p>

Denning, Dorothy E.  <i>Cryptography and Data Security.</i>  Reading (Mass.):
Addison-Wesley, 1987.  Thorough technical reference on the design and
application of various methods.  Includes an analysis of the strengths and
weaknesses of DES.

<p>

Microsoft.  <i>Microsoft Windows Multimedia Programmer's Reference</i>.
Redmond, Washington: Microsoft Press, 1991.  Documents the Windows Multimedia
API, including the <b>waveIn</b><i>xxx</i> and <b>waveOut</b><i>xxx</i>
functions used to receive and send audio, and the <b>mmio</b><i>Xxx</i>
functions used to read <tt>.WAV</tt> files.  This book is useful only if you want
to modify the source code of <i>Speak Freely</i>.

<p>

Schneier, Bruce. <i>The IDEA Encryption Algorithm</i>.  Dr. Dobb's Journal,
<b>208</b>, 50, (December 1993).  Detailed information on the design,
cryptographic security, and implementation of IDEA, used by both PGP and
<i>Speak Freely</i>.  The source code included in this article was adapted to
implement <i>Speak Freely</i> 's IDEA encryption.

<p>

Schneier, Bruce.  <i>Applied Cryptography (2nd ed.)</i>.  New York:
Wiley, 1996.  This essential reference, by the inventor of the
Blowfish encryption algorithm, provides extensive details and on most
contemporary encryption algorithms, including assessment of security
and performance.  C source code is included for a variety of
algorithms, including Blowfish, IDEA, and DES.

<p>

Schulzrinne.  H., R. Frederick, and V. Jacobson.  <cite>RTP: A
Transport Protocol for Real-Time Applications</cite>.  Internet RFC
1889 (January 1996).  Standards track specification of RTP, the
proposed protocol for all forms of real-time data on the Internet.
This document is available on the Internet as
<a href="http://www.ietf.org/rfc/rfc1889.txt">http://www.ietf.org/rfc/rfc1889.txt</a>.

<p>

Schulzrinne.  H. <cite>RTP Profile for Audio and Video Conferences
with Minimal Control</cite>.  Internet RFC 1890 (January 1996).
Specifies audio and video encodings (compression and encryption modes)
used within RTP packets.  <i>Speak Freely</i>'s RTP support conforms to RFCs
1889 and 1890.  This document is available on the Internet as
<a href="http://www.ietf.org/rfc/rfc1890.txt">http://www.ietf.org/rfc/rfc1890.txt</a>.

<p>

Zimmerman, Philip R.  <i>The Official PGP User's Guide</i>.  Cambridge (Mass.):
MIT Press, 1995.  Written by the creator of PGP, this book provides practical
information on how to obtain, install, and use PGP to securely exchange
information (including <i>Speak Freely</i> keys) even with strangers, and
discusses the strengths and weaknesses of the DES and IDEA cryptographic
algorithms and the legal issues associated with secure communication between
individuals.

</BODY>
</HTML>

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -