共 12 条
- [1] Al Ebri N., 2011, 2011 6th International Conference for Internet Technology and Secured Transactions (ICITST), P40
- [2] Beimel Amos, 2011, Coding and Cryptology. Proceedings of the Third International Workshop, IWCC 2011, P11, DOI 10.1007/978-3-642-20901-7_2
- [3] Blakley G. R., 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK), P313, DOI 10.1109/MARK.1979.8817296
- [4] Blakley G. R., 1994, Error Control, Cryptology, and Speech Compression. Workshop on Information Protection. Selected Papers, P33
- [5] Bozkurt I.N., 2008, P INF SEC CRYPT 2008
- [6] Chen CC, 2008, J INF SCI ENG, V24, P1567
- [7] Csirmaz L., 2011, 2011174 CRYPT EPRINT
- [8] Iftere S., 2007, 0701 TR U A CUZ IAS
- [9] Martin K.M., 2008, P ROYAL FLEM AC BELG, P45