共 50 条
- [31] E-mail encryption methods and lawful interception methods of it [J]. 2013 15TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2013, : 29 - 32
- [32] Secure e-mail and databases using chaotic encryption [J]. ELECTRONICS LETTERS, 2000, 36 (10) : 875 - 876
- [34] An Efficient Deniable Authenticated Encryption Scheme for Privacy Protection [J]. IEEE ACCESS, 2019, 7 : 43453 - 43461
- [35] Research on an E-mail Encryption Protocol Based on Quantum Teleportation [J]. International Journal of Theoretical Physics, 2016, 55 : 4773 - 4784
- [36] A Lightweight 1.16 pJ/bit Processor for the Authenticated Encryption Scheme KetjeSR [J]. 2019 INTERNATIONAL SYMPOSIUM ON VLSI DESIGN, AUTOMATION AND TEST (VLSI-DAT), 2019,
- [38] E-mail rules: A business guide to managing policies, security, and legal issues for e-mail and digital communication [J]. ONLINE, 2003, 27 (05): : 63 - 63