Jigsaw-based secure data transfer over computer networks
暂无分享,去创建一个
Dharma P. Agrawal | Sugata Sanyal | Ajith Abraham | Rangarajan Vasudevan | D. Agrawal | A. Abraham | S. Sanyal | R. Vasudevan
[1] J. Fridrich. Symmetric Ciphers Based on Two-Dimensional Chaotic Maps , 1998 .
[2] Ueli Maurer,et al. Unconditionally Secure Key Agreement and the Intrinsic Conditional Information , 1999, IEEE Trans. Inf. Theory.
[3] Gilles Brassard,et al. 25 years of quantum cryptography , 1996, SIGA.
[4] Ralph Howard,et al. Data encryption standard , 1987 .
[5] Ueli Maurer,et al. Unconditional Security Against Memory-Bounded Adversaries , 1997, CRYPTO.
[6] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[7] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[8] André L. M. dos Santos,et al. Protecting Web usage of credit cards using One-Time Pad cookie encryption , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..
[9] Paul Douglas,et al. Proceedings International Conference on Information Technology: Coding and Computing , 2002, Proceedings. International Conference on Information Technology: Coding and Computing.
[10] G. S. Vernam,et al. Cipher Printing Telegraph Systems For Secret Wire and Radio Telegraphic Communications , 1926, Transactions of the American Institute of Electrical Engineers.
[11] Torsten Braun,et al. Secure Communication: A New Application for Active Networks , 2001, ICN.