共 20 条
[2]
Chase M, 2007, LECT NOTES COMPUT SC, V4392, P515
[3]
Cheng Chen, 2012, Provable Security. Proceedings of the 6th International Conference (ProvSec 2012), P53, DOI 10.1007/978-3-642-33272-2_5
[4]
Debnath Somen, 2019, Advances in Computer, Communication and Control. Proceedings of ETES 2018. Lecture Notes in Networks and Systems (LNNS 41), P113, DOI 10.1007/978-981-13-3122-0_12
[8]
Dong YJ, 2011, PROCEEDINGS OF 2011 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY AND APPLICATION, ICCTA2011, P905, DOI 10.1049/cp.2011.0801
[9]
Emura Keita, 2012, International Journal of Applied Cryptography, V2, P199, DOI 10.1504/IJACT.2012.045589
[10]
Gagné M, 2010, LECT NOTES COMPUT SC, V6280, P154, DOI 10.1007/978-3-642-15317-4_11