共 14 条
[1]
Blakley G. R., 1979, AFIPS Conference Proceedings, vol.48. 1979 National Computer Conference, P313, DOI 10.1109/MARK.1979.8817296
[2]
Denning DER, 1983, CRYPTOGRAPHY DATA SE
[3]
KIM S, 1997, LECT NOTES COMPUTER, V1334, P223
[4]
LEE NY, 1998, LECT NOTES COMPUTER, V1438, P415
[5]
Mambo M, 1996, IEICE T FUND ELECTR, VE79A, P1338
[6]
Mambo M., 1996, 3rd ACM Conference on Computer and Communications Security, P48, DOI 10.1145/238168.238185
[7]
Neuman B. C., 1993, Proceedings the 13th International Conference on Distributed Computing Systems (Cat. No.93CH3282-1), P283, DOI 10.1109/ICDCS.1993.287698
[8]
PEDERSEN TP, 1991, LECT NOTES COMPUT SC, V547, P221
[9]
Rivest Ronald L., 1992, 1321 RFC