共 10 条
- [2] [Anonymous], 2001, Fed. Inf. Process. Stand. Publ, V197
- [3] Bawuah, 2018, J MATH ACUMEN RES, V3, P1
- [4] El Kinani E.H., 2012, Int. J. Inf. Netw. Secur., V1, P54, DOI 10.11591/ijins.v1i2.430
- [5] Kahate A, 2013, Cryptography and network security, P501
- [6] KOBLITZ N, 1987, MATH COMPUT, V48, P203, DOI 10.1090/S0025-5718-1987-0866109-5
- [8] Mitali A. S., Int. J. Emerg. Trends Technol. Comput. Sci
- [9] Stallings W., NETWORK SECURITY ESS
- [10] Vigila SMC, 2009, FIRST INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING 2009 (ICAC 2009), P82, DOI 10.1109/ICADVC.2009.5378025