共 50 条
- [2] Secure e-mail and databases using chaotic encryption [J]. ELECTRONICS LETTERS, 2000, 36 (10) : 875 - 876
- [3] ARE YOU CONTROLLING YOUR E-MAIL? OR IS YOUR E-MAIL CONTROLLING YOU? [J]. 6TH INTERNATIONAL CONFERENCE OF EDUCATION, RESEARCH AND INNOVATION (ICERI 2013), 2013, : 3912 - 3919
- [9] TRANSPARENT PROXY FOR SECURE E-MAIL [J]. JOURNAL OF ELECTRICAL ENGINEERING-ELEKTROTECHNICKY CASOPIS, 2010, 61 (03): : 183 - 188
- [10] Cryptonet:: Secure E-mail system [J]. SECRYPT 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2008, : 84 - 91