参考文献/References:
[ 1] M enezes A, van Oorscho t P, Vanstone S. H andbook o f Applied Cryptog raphy[M ] . USA: CRC Press Inc, 1997.
[ 2] B lake-W ilson S, M eneses A. Unknown key- sha re a ttacks on the station-to- sta tion ( STS) protoco l[ D]. Canada: Univers ity o f W a terloo, 1998.
[ 3] 韦卫, 王德杰, 张英, 等. 基于SSL的安全WWW 系统的研究与实现[ J]. 计算机研究与发展, 1999, 36( 5): 619-624.
W eW e ,i W ang De jie, Zhang Y ing, e t a.l Study and imp lem enta tion o f a securew orld w idew eb system based on secure so ckets layer[ J] . Journa l of Computer Research and Dev elopment, 1999, 36( 5): 619-624. ( in Chinese)
[ 4] BurrowM, Abad iM, Needham R. A log ic of authen tication[ J]. ACM Transactions on Com pute r System s, 1990, 8( 1): 18-36
相似文献/References:
[1]黄赛平,许明.验证码的识别与改进[J].南京师范大学学报(工程技术版),2009,09(02):084.
Huang Saiping,Xu Ming.Recognition and Improvement of Identifying Code[J].Journal of Nanjing Normal University(Engineering and Technology),2009,09(04):084.
[2]商炳章,白清源.基于互信息规则剪枝的关联文本分类[J].南京师范大学学报(工程技术版),2008,08(04):173.
Shang B ingzhang,B aiQ ingyuan.On Classif ication of Associative Text Based on Rules Pruning ofMutual Information[J].Journal of Nanjing Normal University(Engineering and Technology),2008,08(04):173.
[3]李 慧,李存华,王 霞.一种新颖的个性化视频搜索排名算法[J].南京师范大学学报(工程技术版),2008,08(04):182.
L iH u,i L iCunhua,W ang X ia.A Novel Individualized V ideo Search Rank ing Algorithm[J].Journal of Nanjing Normal University(Engineering and Technology),2008,08(04):182.
[4]强 浩,施连敏,王洪元.基于CDMA 6025平台的Flash文件系统的设计[J].南京师范大学学报(工程技术版),2008,08(04):186.
Q iang H ao,Sh iL ianm in,W angH ongyuan. Design of Flash File System Based on 6025 P latform of CDMA[J].Journal of Nanjing Normal University(Engineering and Technology),2008,08(04):186.
[5]冯茂岩.立体显示与三维液晶技术研究[J].南京师范大学学报(工程技术版),2008,08(04):195.
FengM aoyan.Research of the Stereoscopic D isplay and 3D LCD Technique[J].Journal of Nanjing Normal University(Engineering and Technology),2008,08(04):195.