共 41 条
- [2] [Anonymous], 2016, P 20 PAN HELL C INF
- [3] [Anonymous], 2001, FIPS PUB
- [4] [Anonymous], 2012, ISSE 2012 Securing Electronic Business Processes
- [5] [Anonymous], 2016, Tech. rep.
- [6] [Anonymous], 2019, BUSINESS INSIDER
- [7] Aravindhan K., 2013, International Journal of Emerging Trends in Engineering and Development, V1, P613
- [8] A Survey on Authentication Techniques for the Internet of Things [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND DISTRIBUTED SYSTEMS (ICFNDS '17), 2017,
- [9] On the Practical (In-) Security of 64-bit Block Ciphers [J]. CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 456 - 467
- [10] Boneh D., 1999, NOT AM MATH SOC, V46, P203, DOI DOI 10.14722/NDSS.2015.23264