共 177 条
- [91] Kazim A, 2019, INT CONF INFORM COMM, P58, DOI [10.1109/iacs.2019.8809179, 10.1109/IACS.2019.8809179]
- [93] Kent K., 2006, Nat. Inst. Standards Technol., V800-86, DOI DOI 10.6028/NIST.SP.800-86
- [94] Keyvanpour M, 2014, STUD COMPUT INTELL, V555, P17, DOI 10.1007/978-3-319-05885-6_2
- [95] Khalid Zainab., 2021, 2021 5th Cyber Security in Networking Conference (CSNet), P90, DOI DOI 10.1109/CSNET52717.2021.9614647
- [96] Khoa N.H., 2020, P 2020 RIVF INT C CO, P1
- [97] Khweiled R., 2022, P 2022 INT C SMART A, P01
- [98] Kiley M, 2008, INT FED INFO PROC, V285, P129
- [99] Forensic analysis of instant messaging apps: Decrypting Wickr and private text messaging data [J]. FORENSIC SCIENCE INTERNATIONAL-DIGITAL INVESTIGATION, 2021, 37
- [100] A study on the decryption methods of telegram X and BBM-Enterprise databases in mobile and PC [J]. FORENSIC SCIENCE INTERNATIONAL-DIGITAL INVESTIGATION, 2020, 35