共 7 条
[1]
Al-saggaf A. A., 2007, P IEEE INT C ADV COM
[3]
Juels A, 1999, 6TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P28, DOI 10.1145/319709.319714
[4]
Kleinjung T., 2010, CRYPTO 10 P 30 ANN C, P330
[5]
Ojha D.B., 2010, SURVEYS MATH ITS APP, V5, P73
[6]
Premasathian N., 2012, INT C COMP SCI MED E, P34
[7]
Schneier B., 2015, APPL CRYPTOGRAPHY, VSecond