共 50 条
- [1] Security Research on LTE with Neural Cryptography [J]. PROCEEDINGS OF 2008 INTERNATIONAL PRE-OLYMPIC CONGRESS ON COMPUTER SCIENCE, VOL II: INFORMATION SCIENCE AND ENGINEERING, 2008, : 133 - 136
- [2] Security Analysis of Neural Cryptography Implementation [J]. 2013 IEEE PACIFIC RIM CONFERENCE ON COMMUNICATIONS, COMPUTERS AND SIGNAL PROCESSING (PACRIM), 2013, : 195 - 199
- [3] Security research on WiMAX with neural cryptography [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 370 - 373
- [4] Security Enhancement in Image Steganography Using Neural Networks and Visual Cryptography [J]. 2016 INTERNATIONAL CONFERENCE ON COMPUTATION SYSTEM AND INFORMATION TECHNOLOGY FOR SUSTAINABLE SOLUTIONS (CSITSS), 2016, : 396 - 402
- [5] A new service-based computing security model with neural cryptography [J]. PROCEEDINGS OF THE 2009 SECOND PACIFIC-ASIA CONFERENCE ON WEB MINING AND WEB-BASED APPLICATION, 2009, : 154 - 156
- [6] On the security of golden cryptography [J]. International Journal of Network Security, 2008, 7 (03) : 448 - 450
- [7] Cryptography, security, and the future [J]. COMMUNICATIONS OF THE ACM, 1997, 40 (01) : 138 - 138
- [9] Cryptography for Security in IoT [J]. 2018 FIFTH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS: SYSTEMS, MANAGEMENT AND SECURITY, 2018, : 23 - 30
- [10] Unconditional security in cryptography [J]. LECTURES ON DATA SECURITY: MODERN CRYPTOLOGY IN THEORY AND PRACTICE, 1999, 1561 : 217 - 250