共 50 条
[11]
Chaturvedi Ankita, 2013, Information Systems Security. 9th International Conference, ICISS 2013. Proceedings: LNCS 8303, P63, DOI 10.1007/978-3-642-45204-8_5
[14]
Cheng-Chi Lee, 2011, WSEAS Transactions on Communications, V10, P193
[15]
Clark J., 1997, SURVEY AUTHENTICATIO
[19]
Eisenbarth T, 2008, LECT NOTES COMPUT SC, V5157, P203, DOI 10.1007/978-3-540-85174-5_12
[20]
Eldefrawy M. H., 2010, 2010 International Conference on Anti-Counterfeiting, Security and Identification (2010 ASID), P1, DOI 10.1109/ICASID.2010.5551480