共 18 条
- [1] Burk H., 1990, Computers & Security, V9, P715, DOI 10.1016/0167-4048(90)90114-9
- [2] CHAUM D, 1985, COMMUN ACM, V28, P1030, DOI 10.1145/4372.4373
- [3] CHAUM D, 1990, LECT NOTES COMPUT SC, V435, P591
- [4] DIERSTEIN R, 1990, 1990 IFIP SEC 90
- [5] PFITZMANN A, 1991, 1991 P IFIP SEC 91 B, P245
- [6] PFITZMANN A, 1991, STATEMENT OBSERVATIO
- [7] RANNENBERG K, 1991, COMPUTER RECH, V7, P699
- [8] Rihaczek K., 1991, Computers & Security, V10, P101, DOI 10.1016/0167-4048(91)90003-V
- [9] COMMUNICATION THEORY OF SECRECY SYSTEMS [J]. BELL SYSTEM TECHNICAL JOURNAL, 1949, 28 (04): : 656 - 715