共 30 条
[1]
Alabaichi Ashwak, 2013, 2013 Second International Conference on Informatics & Applications (ICIA), P12, DOI 10.1109/ICoIA.2013.6650222
[3]
At N., 2012, Proceedings of the Fifth IFIP International Conference on New Technologies, Mobility and Security-NTMS 2012, P1
[4]
Bahnasawi MA, 2016, INT C MICROELECTRON, P285, DOI 10.1109/ICM.2016.7847871
[5]
Christina L., 2014, INT J INNOV RES COMP, V2, P5009
[8]
Traditional and Hybrid Encryption Techniques: A Survey
[J].
NETWORKING COMMUNICATION AND DATA KNOWLEDGE ENGINEERING, VOL 2,
2018, 4
:239-248
[9]
Harmouch Y., 2017, ADV INTELL SYST
[10]
Jang SW, 2017, ANAL APPL MATH, V10, P5