共 16 条
- [11] HU W, WU Q H, LIU S L, Et al., Design of secure eID and identity authentication agreement in mobile terminal based on Chinese cryptographic algorithm and blockchain, Netinfo Security, 7, pp. 7-15, (2018)
- [12] ZHANG P, CHEN C S, HU H G., Authenticated encryption modes based on block ciphers, Netinfo Security, 11, pp. 8-17, (2014)
- [13] LI M, SHI G Z, LOU J P., USB Key identity authentication scheme based on encryption service platform, Computer Applications and Software, 35, 9, pp. 288-291, (2018)
- [14] XU H B, LI Y H., The application of DES encryption algorithm to protect data security in the file transfer, Netinfo Security, 6, pp. 24-26, (2009)
- [15] ZHANG J H, GUO X B, FU X., AES encryption algorithm analysis and the application in information security, Netinfo Security, 5, pp. 31-33, (2011)
- [16] CUI G Y., To build international market security made in China-decoding the international exploration and practice of flying integrity, China Information Security, 10, pp. 74-76, (2018)