A novel application of grey system theory to information security (Part I)
暂无分享,去创建一个
[1] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[2] Deng Ju-Long,et al. Control problems of grey systems , 1982 .
[3] J. Deng,et al. Introduction to Grey system theory , 1989 .
[4] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[5] Yu-Fang Chung,et al. A practical authenticated encryption scheme based on the elliptic curve cryptosystem , 2004, Comput. Stand. Interfaces.
[6] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[7] Jyh-Shing Roger Jang,et al. ANFIS: adaptive-network-based fuzzy inference system , 1993, IEEE Trans. Syst. Man Cybern..
[8] Yu-Fang Chung,et al. ID-based digital signature scheme on the elliptic curve cryptosystem , 2007, Comput. Stand. Interfaces.
[9] Wen-Guey Tzeng,et al. A Time-Bound Cryptographic Key Assignment Scheme for Access Control in a Hierarchy , 2002, IEEE Trans. Knowl. Data Eng..
[10] Yo-Ping Huang,et al. The hybrid grey-based models for temperature prediction , 1997, IEEE Trans. Syst. Man Cybern. Part B.