共 13 条
[1]
Arumugam S., 2012, K N VISUAL CRYPTOGRA, P1
[2]
Ateniese G., 1996, CONSTRUCTIONS BOUNDS, P1
[3]
Ching-Nung Yang, 2011, Journal of Electronic Science and Technology, V9, P317, DOI 10.3969/j.issn.1674-862X.2011.04.007
[4]
Gupta R., 2012, INT J ELECT COMPUTER, P794
[5]
Haibo Zhang, 2009, Journal of Multimedia, V4, P104
[6]
Haupt R.L., 2004, PRACTICAL GENETIC AL, p[21, 137]
[8]
Hsu CS, 2006, LECT NOTES ARTIF INT, V4203, P58
[9]
Monoth Thomas, 2009, International Journal of Recent Trends in Engineering, V1, P468
[10]
Naor M., 1997, Security Protocols. International Workshop Proceedings, P197