共 39 条
- [6] A Software Watermarking Method Based on Public-Key Cryptography and Graph Coloring THIRD INTERNATIONAL CONFERENCE ON GENETIC AND EVOLUTIONARY COMPUTING, 2009, : 433 - 437
- [8] Traitor tracing using identity based public-key cryptography Chin J Electron, 2006, 4 (687-691):
- [9] Traitor tracing using identity based public-key cryptography CHINESE JOURNAL OF ELECTRONICS, 2006, 15 (04): : 687 - 691
- [10] Energy analysis of public-key cryptography for wireless sensor networks Third IEEE International Conference on Pervasive Computing and Communications, Proceedings, 2005, : 324 - 328