共 14 条
- [1] Acharya B., INT J SECUR, V1, P14
- [2] Privacy Protection of Biometric Traits using Modified Hill Cipher with Involutory Key and Robust Cryptosystem [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE AND EXHIBITION ON BIOMETRICS TECHNOLOGY, 2010, 2 : 242 - 247
- [3] Eisenberg M., 1999, HILL CIPHERS M UNPUB, P1
- [5] Mahmoud AhmedY., 2009, Proceedings of the 2nd international conference on Security of information and networks, P164, DOI DOI 10.1145/1626195.1626237
- [6] Melorose J., 2015, STATEW AGR L USE BAS, V1, P306
- [7] Saeednia S, 2000, CRYPTOLOGIA, V24, P353, DOI 10.1080/01611190008984253
- [8] Sastry V. U. K., 2007, Journal of Computer Sciences, V3, P854, DOI 10.3844/jcssp.2007.854.859
- [9] Schneier B., APPL CRYPTOGRAPHY
- [10] COMMUNICATION THEORY OF SECRECY SYSTEMS [J]. BELL SYSTEM TECHNICAL JOURNAL, 1949, 28 (04): : 656 - 715