[1]
Kaiquan Shi, P-sets and its applications[J]. An International Journal Advances in Systems Science and Applications, 2009, 9(2): 209-219.
Google Scholar
[2]
Kaiquan Shi, P-sets[J]. Journal of Shandong University (Natural Science), 2008, 43(11): 77-84(in Chinese).
Google Scholar
[3]
Li Zhang, Yuquan Cui, Kaiquan Shi, Outer P-sets and data internal-recovery[J]. System Engineering and Electronics, 2010, 32(6): 1233-1238(in Chinese).
Google Scholar
[4]
Yuying Li, Li Zhang, Kaiquan Shi, Generation and recovery of compressed data and redundant data[J]. Quantitative Logic and Soft Computing, 2010, 1(2): 661-672.
DOI: 10.1007/978-3-642-15660-1_67
Google Scholar
[5]
Yang Wang, Hongqin Geng, Kaiquan Shi, The mining of dynamic information based on P- sets and its application[J]. An International Journal Advances in Systems Science and Applications, 2010, 10(2): 234-240.
Google Scholar
[6]
Kaiquan Shi, Xiuhong Li, Camouflaged information identification and its application [J]. An International Journal Advances in Systems Science and Applications, 2010, 10(2): 157-167.
Google Scholar
[7]
Ruohui Liu, Baocang Liu, Kaiquan Shi, outer P-set and F-information camouflage[J]. System Engineering and Electronics, 2011, 33(1): 116-119.
Google Scholar
[8]
Hongqin Geng, Guanyu Zhang, Kaiquan Shi, F-information camouflage and camouflage- recovery identification[J]. Computer Science, 2011, 38(2): 241-245.
Google Scholar
[9]
Koblitz N, Elliptic curve cryptosystems[J]. Mathematics of Computation, 1987, 48(17): 203-209.
DOI: 10.1090/s0025-5718-1987-0866109-5
Google Scholar
[10]
Stallings W, Cryptography and network security principles and practice, London: Prentice-Hall Int Ltd, 1999, 193-206.
Google Scholar