共 9 条
[1]
[Anonymous], INT J NETWORK SECURI
[2]
[Anonymous], 1997, Handbook of Applied Cryptography
[5]
Chen Hsing-Chung, 2012, 6 INT C INN MOB INT
[6]
Hong-Bin Tang, 2013, International Journal of Network Security, V15, P446
[7]
Hwang Tzonelih, 2007, IEEE T DEPENDABLE SE, V4
[8]
Hwang Tzonelih, 1990, P IEEE REG 10 C COMP
[9]
Scarani Valerio, THEORETICAL COMPUTER, V560, P27