共 16 条
[1]
FANG J, 2003, J SE U NATURAL SCI S, V33, P78
[3]
HEILEMAN GL, 1993, P INT S NONL THEOR I, V1, P1183
[5]
KOU W, 1997, NETWORK SECURITY STA
[7]
Liu Junning, 2000, Journal of Tsinghua University (Science and Technology), V40, P55
[8]
PIEPRZYH J, 1993, DESIGN HASHING ALGOR
[9]
STEPS TOWARD UNMASKING SECURE COMMUNICATIONS
[J].
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS,
1994, 4 (04)
:959-977
[10]
SHORT KM, 1994, BIFURC CHAOS, V7, P1579