Subject
Law,General Computer Science
Reference11 articles.
1. A Database Encryption System with Subkeys;Davida;ACM Transactions on Database Systems,1981
2. Password Authentication with Insecure Communication;Lamport;Communications of the ACM,1981
3. Encryption & Secure Computer Networks;Popek;Computing Survey,1979
4. Communication Theory of Secrecy Systems;Shannon;Bell Systems Tech. J.,1949
5. Probabilistic Completeness of Substitution-Permutation Encryption Networks;Ayoub;IEE Proceeding,1982
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献