共 11 条
[1]
[Anonymous], 2014, NATURE COMMUNICATION, V5
[2]
Faraj Al-Janabi Sufyan T., REDUCING AUTHENTICAT
[3]
Jasim Omer Abd Al Kareem, 2012, INT J COMPUTER APPL, V56
[4]
Jasim Omer K., 2013, 8 INT C INT TECHN SE, P536
[5]
Matthew P., 2008, DAYLIGHT OPERATION F
[6]
Mohammad OKJ, 2014, INT CONF CYBER SECUR, P45, DOI 10.1109/CyberSec.2014.6913970
[7]
Niemiec M, 2012, IEEE GLOB COMM CONF, P967, DOI 10.1109/GLOCOM.2012.6503238
[8]
Qiao H, 2009, PROCEEDINGS OF THE 14TH YOUTH CONFERENCE ON COMMUNICATION, P483
[9]
Shaikh AmrinBanu M., 2013, 5 INT C ADV REC TECH
[10]
Sharifi1 Mohsen, 2007, JCS T, V7