共 27 条
[2]
Chang CC, 2003, INFORMATICA-LITHUAN, V14, P289
[5]
Diffie W., 1992, Designs, Codes and Cryptography, V2, P107, DOI 10.1007/BF00124891
[6]
Diffie W., 1992, IEICE T, V2, P107
[9]
Haller N. M., 1994, Proceedings Internet Society Symposium on Network and Distributed System Security 1994, P151
[10]
Hsu CL, 2004, COMP STAND INTER, V26, P167, DOI [10.1016/S0920-5489(03)00094-1, 10.1016/s0920-5489(03)00094-1]