共 50 条
[1]
[Anonymous], 1981, The Art of Computer Programming
[2]
[Anonymous], 2011, ISTANBUL STOCK EXCHA
[3]
[Anonymous], 1987, 19 ACM STOC, DOI [DOI 10.1145/28395.28420, 10.1145/28395.28420]
[4]
Barker E., NIST Special Publication, V800-90C
[5]
Baron Joshua, 2012, Security and Cryptography for Networks. Proceedings of the 8th International Conference (SCN 2012), P222, DOI 10.1007/978-3-642-32928-9_13
[6]
Bresson E, 2003, LECT NOTES COMPUT SC, V2894, P37
[7]
Chamberlin B., 2014, LOT INTERNET THINGS
[8]
Clarke J., 1994, Pieces of the puzzle: the jigsaw method. Penn State University, P120
[9]
Coron JS, 2014, LECT NOTES COMPUT SC, V8383, P311, DOI 10.1007/978-3-642-54631-0_18
[10]
Cramer R, 2002, LECT NOTES COMPUT SC, V2332, P45