共 15 条
- [1] Acharya B., 2007, International Journal of Security, V1, P14
- [2] Asbullah M.A., 2019, J SCI, V67, P73, DOI [10.22452/mjs.sp2019no1.6, DOI 10.22452/MJS.SP2019NO1.6]
- [3] Hamamreh RA, 2009, INT J COMPUT SCI NET, V9, P11
- [4] Kahn D., 1967, CODEBREAKERS STORY S, P404
- [5] Mahapatra A., 2007, THESIS
- [6] Panigrahy S.K., 2008, 1 INT C ADV COMPUTIN, P1
- [7] Reddy L.S., 2012, INT J SOFT COMPUT EN, V10, P73
- [8] RIVEST RL, 1978, COMMUN ACM, V21, P120, DOI [10.1145/359340.359342, 10.1145/357980.358017]
- [9] Rosen K.H., 1987, ELEMENTARY NUMBER TH, P224
- [10] Satyajeet R, 2014, IJCSIT INT J COMPUTE, V5, P7232