共 47 条
[1]
Abdalla M, 2005, LECT NOTES COMPUT SC, V3386, P65
[2]
Amin R, 2015, 2015 THIRD INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION, CONTROL AND INFORMATION TECHNOLOGY (C3IT)
[6]
Remote Access Control Mechanism Using Rabin Public Key Cryptosystem
[J].
INFORMATION SYSTEMS DESIGN AND INTELLIGENT APPLICATIONS, VOL 1,
2015, 339
:525-533
[7]
[Anonymous], 2013, INT J COMPUTER APPL
[8]
BELLOVIN SM, 1992, 1992 IEEE COMPUTER SOCIETY SYMPOSIUM ON RESEARCH IN SECURITY AND PRIVACY : PROCEEDINGS, P72
[9]
Chang C., 2008, P 2 INTERNATIONALCON, P329