Threats to Privacy and Public Keys for Protection
暂无分享,去创建一个
[1] Morrie Gasser,et al. The Digital Distributed System Security Architecture , 1989 .
[2] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[3] Ronald L. Rivest,et al. The MD4 Message-Digest Algorithm , 1990, RFC.
[4] Jim,et al. System Based on Pu blic-Key Techniques , 2000 .
[5] Maria M. Pozzo,et al. An approach to containing computer viruses , 1987, Comput. Secur..