共 29 条
[1]
Abe M, 2014, LECT NOTES COMPUT SC, V8616, P390, DOI 10.1007/978-3-662-44371-2_22
[2]
Abe M, 2014, LECT NOTES COMPUT SC, V8616, P241, DOI 10.1007/978-3-662-44371-2_14
[3]
Abe M, 2014, LECT NOTES COMPUT SC, V8349, P688, DOI 10.1007/978-3-642-54242-8_29
[4]
Abe M, 2013, LECT NOTES COMPUT SC, V7778, P312, DOI 10.1007/978-3-642-36362-7_20
[5]
Abe M, 2012, LECT NOTES COMPUT SC, V7658, P4, DOI 10.1007/978-3-642-34961-4_3
[6]
Abe M, 2011, LECT NOTES COMPUT SC, V6841, P649, DOI 10.1007/978-3-642-22792-9_37
[7]
Abe M, 2011, LECT NOTES COMPUT SC, V7073, P628, DOI 10.1007/978-3-642-25385-0_34
[8]
Abe M, 2010, LECT NOTES COMPUT SC, V6223, P209, DOI 10.1007/978-3-642-14623-7_12
[9]
Akinyele J.A., 2013, Proceedings of the 2013 ACM SIGSAC Conference on Computer #38
[10]
Communications Security, P399