共 40 条
[1]
Alvim MS, 2010, IFIP ADV INF COMM TE, V323, P55
[2]
Andres Miguel E., 2010, Proceedings of the 2010 Seventh International Conference on the Quantitative Evaluation of Systems (QEST 2010), P17, DOI 10.1109/QEST.2010.11
[3]
[Anonymous], 2006, Elements of Information Theory
[4]
[Anonymous], ACM Transactions on Information and System Security (TISSEC), DOI DOI 10.1145/290163.290168
[5]
Bhargava M, 2005, LECT NOTES COMPUT SC, V3653, P171, DOI 10.1007/11539452_16
[6]
Braun C, 2008, LECT NOTES COMPUT SC, V4962, P443, DOI 10.1007/978-3-540-78499-9_31
[8]
Cachin Christian, 1997, Entropy measures and unconditional security in cryptography
[9]
CANETTI R, 2006, P 8 INT WORKSH DISCR
[10]
Canetti R, 2006, LECT NOTES COMPUT SC, V4167, P238