1157
Bibliography
•
RFC 2616,
Hypertext Transfer Protocol—HTTP/1.1
•
RFC 2898,
PKCS #5: Password-Based Cryptography Specification Version 2.0
•
RFC 3066,
Tags for the Identification of Languages
•
RFC 3161,
Internet X.509 Public Key Infrastructure Time-Stamp Protocol (TSP)
•
RFC 3174,
US Secure Hash Algorithm 1 (SHA1)
•
RFC 3280,
Internet X.509 Public Key Infrastructure, Certificate and Certificate
Revocation List (CRL) Profile
Internet Engineering Task Force (IETF) Public Key Infrastructure (PKIX) work-
ing group: <http://www.ietf.org/html.charters/pkix-charter.html>
Kirk, D. (ed.),
Graphics Gems III,
Academic Press, 1994. The section “Interpola-
tion Using Bézier Curves” by Gershon Elber contains an algorithm for calculating
a Bézier curve that passes through a user-specified set of points. The algorithm
uses not only cubic Bézier curves, which are supported in PDF, but also higher-
order Bézier curves. The appendix contains an implementation of the algorithm,
written in the C programming language. The source code appearing in the
appendix is available via anonymous FTP, as described in the book’s preface.
Lunde, K.,
CJKV Information Processing,
O’Reilly & Associates, Sebastopol, CA,
1999. Excellent background material on CMaps, character sets, encodings, and
the like.
Microsoft Corporation,
TrueType 1.0 Font Files Technical Specification.
Available
at < http://www.microsoft.com/typography/tt/tt.htm >.
Netscape Communications Corporation,
Client-Side JavaScript Reference
and
other JavaScript documents are available through the Adobe Web page
Pennebaker, W. B. and Mitchell, J. L.,
JPEG: Still Image Data Compression Stan-
dard,
Van Nostrand Reinhold, New York, 1992.
Porter, T. and Duff, T., “Compositing Digital Images,”
Computer Graphics,
Vol. 18
No. 3, July 1984.
Computer Graphics
is the newsletter of the ACM’s special interest
group SIGGRAPH; for more information, see < http://www.acm.org >.