共 36 条
[1]
Abdalla M, 2005, LECT NOTES COMPUT SC, V3386, P65
[2]
[Anonymous], 2010, Network
[3]
Bagherzandi A, 2011, PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), P433
[4]
Beerliová-Trubíniová Z, 2008, LECT NOTES COMPUT SC, V4948, P213, DOI 10.1007/978-3-540-78524-8_13
[5]
Bellare M, 2000, LECT NOTES COMPUT SC, V1807, P139
[6]
Bellare M., 1994, CRYPTO, P232
[7]
Bellovin S. M., 1992, Proceedings. 1992 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.92CH3157-5), P72, DOI 10.1109/RISP.1992.213269
[8]
Bellovin S.M., 1993, CCS 93, P244
[10]
Bogdanov D, 2008, LECT NOTES COMPUT SC, V5283, P192