 
                            ...
| Anchor | ||||
|---|---|---|---|---|
| 
 | 
[Sethi 2009] Sethi, Amit. Proper Use of Java's SecureRandom. Cigital Justice League Blog (2009).
| Anchor | Spinellis 2006 | Spinellis 2006 | 
|---|
| Anchor | |||
|---|---|---|---|
| 
 | 
[Steel 2005] Steel, Christopher, Ramesh Nagappan, and Ray Lai. Core Security Patterns: Best Practices and Strategies for J2EE™, Web Services, and Identity Management. Upper Saddle River, NJ: Prentice Hall PTR (2005).
...