Computer Science ›› 2013, Vol. 40 ›› Issue (12): 208-210.
Previous Articles Next Articles
HE Xiao-qin and LU Yi-nan
[1] Latora V,Marchiori M.The Architecture of complex systems[M]∥Gell-Mann M,Tsallis C.Nonextensive entropy:interdisci-plinary applications.New York:Oxford University Press,2002:377-386 [2] Newman M E J.The structure and function of complex network [J].SIAM Review,2003,45(2):167-256 [3] Newman M E J.Scientific collaboration networks.I.Network construction and fundamental result[J].Physical Review E,2001,64(1) [4] 张建辉,王典洪.一种基于Java Applet的 Vigen~re密文破译方法[J].计算机与现代化,2003,5:17-20 [5] 徐小华.Vigenere密码加密和解密的程序实现[J].信息技术,2010,2:121-123 [6] 王飞.基于vigenere密码的文件加解密器的研究与实现[J].信息系统工程,2011,7:50-52 [7] 刘桂海,张璟.基于双密钥的三维Vigenere密码的研究与应用[J].计算机工程与应用,2008,2:131-133 [8] 韩春艳,包旭雷,王光义.一种新的数字混沌密码序列及其性能分析[J].重庆邮电大学学报:自然科学版,2010,2(3):334-338 |
No related articles found! |
|