共 10 条
- [1] Benaloh J., 1990, P CRYPTO 88, P27
- [2] CHARNES C, 1997, P 1 INT C ICICS 97, P81
- [3] Cho H. H., 2001, 2 WORKSH INF SEC APP, P357
- [4] NEW DIRECTIONS IN CRYPTOGRAPHY [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) : 644 - 654
- [5] Security management architecture for access control to network resources [J]. IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1997, 144 (06): : 362 - 370
- [6] LIN CH, 1997, COMPUT COMMUN, P1381
- [7] LIN HY, 1991, P ASIACRYPTO 91 SPRI, P149
- [9] SCHNEIER B, 1994, APPL CRYPTOGRAPHY PR, P59
- [10] Stinson D. R., 1992, Designs, Codes and Cryptography, V2, P357, DOI 10.1007/BF00125203