共 19 条
[1]
Abdul minaam Diaa Salama, 2010, EVALUATING EFFECTS S
[2]
Chia-Long Wu, 2012, Proceedings of the 2012 Third International Conference on Innovations in Bio-Inspired Computing and Applications (IBICA), P307, DOI 10.1109/IBICA.2012.9
[3]
Fei Shao, 2010, Proceedings of the Second International Conference on Communication Software and Networks (ICCSN 2010), P588, DOI 10.1109/ICCSN.2010.124
[4]
Jeeva AL., 2012, COMP ANAL PERFORMANC
[5]
Katz Jonathan, 2015, INTRO CRYPTOGRAPHY M
[6]
Khanezaei Nasrin, 2014, 2014 IEEE C SYST PRO
[7]
Mahanta Hridoy Jyoti, 2017, 2017 11 INT C INT SY
[8]
Menezes A.J., HDB APPL CRYPTOGRAPH
[9]
Monika Agrawal P., 2012, COMP SURVEY SYMMETRI
[10]
Monttinen Joni, SECURITY ADV ENCRYPT