共 25 条
[1]
[Anonymous], 2000, NUMBERS GAMES
[3]
Avoine G, 2011, WISEC 11: PROCEEDINGS OF THE FOURTH ACM CONFERENCE ON WIRELESS NETWORK SECURITY, P145
[4]
Avoine G, 2009, LECT NOTES COMPUT SC, V5922, P290, DOI 10.1007/978-3-642-10628-6_20
[5]
Avoine G, 2009, LECT NOTES COMPUT SC, V5735, P250, DOI 10.1007/978-3-642-04474-8_21
[6]
Bengio S., 1991, Journal of Cryptology, V4, P175, DOI 10.1007/BF00196726
[7]
Brands S., 1993, LECT NOTES COMPUTER, P344, DOI [DOI 10.1007/3-540-48285-7_30, 10.1007/3-540-48285-7_30]
[8]
Bussard L, 2005, INT FED INFO PROC, V181, P223
[9]
DESMEDT Y, 1988, LECT NOTES COMPUT SC, V293, P21