The IPS Cryptographic Programs
暂无分享,去创建一个
Alan G. Konheim | Gerald Waldbaum | Bryant Tuckerman | Marian H. Mack | Robert K. McNeill | A. Konheim | B. Tuckerman | M. Mack | G. Waldbaum
[1] H. Feistel. Cryptography and Computer Privacy , 1973 .
[2] Stephen M. Matyas,et al. A Cryptographic Key Management Scheme for Implementing the Data Encryption Standard , 1978, IBM Syst. J..
[3] Edson C. Hendricks,et al. Evolution of a Virtual Machine Subsystem , 1979, IBM Syst. J..
[4] J.L. Smith,et al. Some cryptographic techniques for machine-to-machine data communications , 1975, Proceedings of the IEEE.
[5] Stephen M. Matyas,et al. Generation, Distribution, and Installation of Cryptographic Keys , 1978, IBM Syst. J..
[6] C. Richard Attanasio,et al. Penetrating an Operating System: A Study of VM/370 Integrity , 1976, IBM Syst. J..
[7] Richard E. Lennon. Cryptography Architecture for Information Security , 1978, IBM Syst. J..