共 17 条
[1]
[Anonymous], 1992, J COMPUT SECUR
[2]
Aziz A., 1994, IEEE Personal Communications, V1, P25, DOI 10.1109/98.295357
[3]
Burns J., 1990, Computers & Security, V9, P67, DOI 10.1016/0167-4048(90)90159-Q
[6]
Diffie W., 1992, Designs, Codes and Cryptography, V2, P107, DOI 10.1007/BF00124891
[10]
KEMMERER R, 1994, J CRYPTOL, V7, P79, DOI 10.1007/BF00197942