共 17 条
- [11] Parvees M.Y.M., 2019, J COMPUTATIONAL THEO, V16, P1438
- [12] Poonam, 2018, Procedia Computer Science, V132, P1441, DOI 10.1016/j.procs.2018.05.076
- [14] Singh DK, 2018, PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), P931, DOI 10.1109/ICICCT.2018.8473069
- [16] Yuan WT, 2017, INT C TRANS OPT NETW
- [17] Security analysis of a chaos triggered image encryption scheme [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (22) : 31303 - 31318