共 43 条
[1]
[Anonymous], 1948, Bell System Technical Journal, DOI DOI 10.1002/J.1538-7305.1948.TB01338.X
[2]
Towards sharp inapproximability for any 2-CSP
[J].
48TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS,
2007,
:307-317
[3]
New Enhanced Authentication Protocol for Internet of Things
[J].
BIG DATA MINING AND ANALYTICS,
2021, 4 (01)
:1-9
[4]
Ben Niu, 2015, 2015 IEEE Conference on Computer Communications (INFOCOM). Proceedings, P1017, DOI 10.1109/INFOCOM.2015.7218474
[5]
[毕晓迪 Bi Xiaodi], 2017, [山东大学学报. 理学版, Journal of Shandong University. Natural Science], V52, P75
[6]
Chatzikokolakis K, 2015, LECT NOTES COMPUT SC, V8956, P49, DOI 10.1007/978-3-319-14977-6_4
[10]
Dwork C, 2006, LECT NOTES COMPUT SC, V4052, P1