共 6 条
- [2] Hankerson D., Guide to Elliptic Curve Cryptography
- [3] KOBLITZ N, 1987, MATH COMPUT, V48, P203, DOI 10.1090/S0025-5718-1987-0866109-5
- [4] MILLER V, 1986, ADV CRYPTOLOGY CRYPT, P417
- [5] Computer user verification using login string keystroke dynamics [J]. IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS, 1998, 28 (02): : 236 - 241
- [6] Wang Y., 2002, SCI TOTAL ENVIRON, P18