共 34 条
[1]
[Anonymous], 2003, 3447 RFC
[2]
Chandra Ganesh., 2012, Int. J. Computer Technology Applications, V3, P298
[4]
Feily Maryam., 2010, International Journal of Computer Science and Information Security, V8, P49
[5]
*FIPS, 2001, 197 FIPS
[6]
*FIPS, 1993, 462 FIPS
[7]
Forouzan B, 2007, Cryptography and Network Security
[8]
Furht B, 2005, INTERNET COMMUN SER, P95
[9]
Gupta K., 2011, INT J COMPUT APPL, V29, P1
[10]
An Ethical way for Image Encryption using ECC
[J].
2009 1ST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE, COMMUNICATION SYSTEMS AND NETWORKS(CICSYN 2009),
2009,
:342-+