共 13 条
- [1] CHENG Y, 1998, LNCS, V1397, P291
- [2] Hanaoka G., 1998, Information Security and Privacy. Third Australasian Conference, ACISP'98. Proceedings, P215, DOI 10.1007/BFb0053735
- [3] KIM S, 1997, LECT NOTES COMPUTER, V1334, P223
- [4] Kotzanikolaou P., 2000, LNCS, P289
- [5] Mambo M., 1996, 3rd ACM Conference on Computer and Communications Security, P48, DOI 10.1145/238168.238185
- [6] Menezes AJ., 1997, HDB APPL CRYPTOGRAPH
- [7] RIVEST RL, 1978, COMMUN ACM, V21, P120, DOI 10.1145/357980.358017
- [8] Romao A, 1998, LECT NOTES COMPUT SC, V1402, P80, DOI 10.1007/BFb0053403
- [9] ROMAO A, 2001, LECT NOTES ARTIF INT, V2033, P206
- [10] STINSON DR, 1995, CRYPTOGRAPHY THEORY, P326