共 11 条
[3]
ELFISHAWY N, 2007, INT J NETWORK SECURI, V5, P241
[4]
[韩凤英 HAN Fengying], 2008, [中南林业科技大学学报, Journal of Central South University of Forestry & Technology], V28, P153
[6]
Cryptanalysis of a data security protection scheme for VoIP
[J].
IEE PROCEEDINGS-VISION IMAGE AND SIGNAL PROCESSING,
2006, 153 (01)
:1-10
[7]
[刘金梅 Liu Jinmei], 2007, [华南理工大学学报. 自然科学版, Journal of South China University of Technology. Natural Science Edition], V35, P1
[8]
Peng Fei, 2005, J S CHINA U TECHNOLO, V33, P543
[9]
[丘水生 Qin Shuisheng], 2006, [电路与系统学报, Journal of circuits and systems], V11, P98
[10]
COMMUNICATION THEORY OF SECRECY SYSTEMS
[J].
BELL SYSTEM TECHNICAL JOURNAL,
1949, 28 (04)
:656-715