共 43 条
[11]
Axelsson S., 2000, ACM Transactions on Information and Systems Security, V3, P186, DOI 10.1145/357830.357849
[16]
Dietrich CJ, 2008, P 5 C EM ANT CEAS, P1
[17]
Dreger H., 2004, Proceedings of the 11th ACM conference on Computer and communications security, P2
[18]
Durian B, 2010, LECT NOTES COMPUT SC, V6049, P129, DOI 10.1007/978-3-642-13193-6_12
[20]
Fisk M., 2002, CS20010670 U CAL