1 |
A. Hill, A. D. Brett, and C. J. Taylor, 'Automatic landmark identification using a new method of nonrigid correspondence' in Proceedings of IPMI '97 Conference, vol. 1230, pp. 483-488, 1997
|
2 |
E. Moulines, P. Duhamel, J.F. Cardoso, and S. Mayrargue, Subspace methods for the blind identification of multichannel fir filters, IEEE Transactions on Signal Processing, SP-43, pp. 516-525, 1995
|
3 |
Neil Haller. The s/key(tm) one-time password system. Symposium on Network and Distributed System Security, pp 151-157, February 1994
|
4 |
Jong-Min Park, Yong-Hun Kim, Beom-Joon Cho, 'Password System Enhancing the Security against', The Korean Institute of Maritime Information & Communication Science, Vol. 8, No.8, pp. 1790-1795, 2004
과학기술학회마을
|
5 |
Jong-Min Park, 'Efficient and Secure Authenticated Key Exchange', The Korean Institute of Maritime Information & Communication Science, Vol. 3, No. 3, pp.163-166, 2005
과학기술학회마을
|
6 |
E. Biham and A. Shamir, Differential Cryptanalysis of the Data Encryption Standard, Springer-Verlag, New York, 1993
|
7 |
Bao, F., R. Deng and W. Mao. Efficient and practical fair exchange protocols with off-line TTP. 1998 IEEE Symposium on Security and Privacy. Oakland, IEEE Compute Society. pp 77-85. 1998
|
8 |
E.Biham and A. Shamir, 'Differential Cryptanalysis of DES-like cryptosystems', Advances in Cryptology - CRYPTO '90, LNCS 537, pp.2-21
|
9 |
Andreoni, J. and H. Varian, 'Pre-play Contracting in the Prisoners' Dilemma', mimeo, University of Wisconsin, 1999
|
10 |
Bensaid, B. and R.J. Gary-Bobo, 'An Exact Formula for the Lion's Share: A Model of Pre-Play Negotiation,' Games and Economic Behavior, 14, pp 44-89, 1996
DOI
ScienceOn
|
11 |
B. Schneier, Applied cryptography, John Wiley & Sons, 1996
|
12 |
A. W. Senior and A. J. Robinson. An off-line cursive handwriting recognition system. IEEE Transactions on Pattern Analysis and Machine Intelligence, 20(3) pp309-321, 1998
DOI
ScienceOn
|
13 |
Neil Haller. The s/key(tm) one-time password system. In Proceedings of the 1994 Symposium on Network and Distributed System Security, pp 151-157, 1994
|