共 50 条
- [23] Distributed generation of shared RSA keys in mobile ad hoc networks [J]. ICMIT 2005: INFORMATION SYSTEMS AND SIGNAL PROCESSING, 2005, 6041
- [24] The keys to holographic data security - Encrypted optical memory systems based on multidimensional keys for secure data storage and communication [J]. IEEE CIRCUITS & DEVICES, 2000, 16 (05): : 8 - 15
- [25] Behavioral Keys in Cryptography and Security Systems [J]. ADVANCES IN INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS, INCOS-2017, 2018, 8 : 296 - 300
- [26] Revocation Systems with Very Small Private Keys [J]. 2010 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2010, : 273 - 285
- [27] The Method of Generation Security Profile for Communication Networks and Switching Systems [J]. EXPERIENCE OF DESIGNING AND APPLICATION OF CAD SYSTEMS IN MICROELECTRONICS: PROCEEDINGS OF THE XTH INTERNATIONAL CONFERENCE CADSM 2009, 2009, : 82 - 84
- [29] Pell's RSA key generation and its security analysis [J]. 2013 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND NETWORKING TECHNOLOGIES (ICCCNT), 2013,
- [30] Substation Communication security Research Based on Hybrid Encryption of DES and RSA [J]. 2013 NINTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2013), 2013, : 437 - 441