Cryptosystem Security Evaluation Based on Diagonal Game and Information Theory
暂无分享,去创建一个
[1] Zhu Han,et al. Game Theory in Wireless and Communication Networks , 2008 .
[2] Sungwook Kim,et al. Game Theory Applications in Network Design , 2014 .
[3] Sattar B. Sadkhan,et al. A proposed ANFIS evaluator for RSA cryptosystem used in cloud networking , 2017, 2017 International Conference on Current Research in Computer Science and Information Technology (ICCIT).
[4] P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .
[5] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[6] 조위덕. Cryptography , 1987, The Official (ISC)2 SSCP CBK Reference.
[7] Sattar B. Sadkhan,et al. Security evaluation of cryptosystems used in cloud networks , 2016, 2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA).
[8] Hari Wahyudi,et al. Evaluation of Learning , 2014 .
[9] Zhu Han,et al. Game Theory in Wireless and Communication Networks: Theory, Models, and Applications , 2011 .
[10] Magnus Ramage. Evaluation of learning, evaluation as learning , 1996, SIGO.
[11] Lloyd R. Jaisingh. Statistics for the Utterly Confused , 2000 .
[12] Sean Murphy,et al. Cryptography: A Very Short Introduction , 2002 .