共 16 条
[2]
Denning D. E., 1996, Computer Fraud & Security, P12, DOI 10.1016/S1361-3723(97)82613-9
[3]
Dinh H, 2011, LECT NOTES COMPUT SC, V6841, P761, DOI 10.1007/978-3-642-22792-9_43
[4]
Gabidulin E.M., 1995, CODES CIPHERS, V11, P17
[5]
GABIDULIN EM, 1991, LECT NOTES COMPUT SC, V547, P482
[6]
GABIDULIN EM, 2009, INT S INF THEOR ISIT, P1110
[8]
Haidine A., 2011, 2011 Proceedings of IEEE International Symposium on Power Line Communications and Its Applications (ISPLC), P468, DOI 10.1109/ISPLC.2011.5764443
[10]
McEliece R., 1978, DSN PROG RE, V42-44, P114