6V. L. Voydock,S. L. Kent. Security mechanisms in high-level network protocols[J]. Computer Surveys ,1983,15(2) : 135 - 171. 被引量:1
7R. Fisher. Information Systems Security[M]. Englewood Cliffs, NJ : Prentice - Hail, 1984. 被引量:1
8G. J. Simmons. Authentication without Secrecy:A secure Communication Problem Uniquely Solvable by Asymmetric Encryption Techniques[A]. Proceedings of IEEE EASCON79[C] ,1979:661 -662. 被引量:1
10Simmons, G. J, ,Sandia Nat. Lab. , Albuquerque, NM. A survey of information authentication [J]. Proceedings of the IEEE, 1998,76 (5) : 603 - 620. 被引量:1