On Determining the Type of a Symmetric Key Crypto-algorithm and How to Evaluate Its Security
ou hai-wen1 li feng-hua2 yang ming-hua3 (1. key laboratory of information security and secrecy; beijing institute of electronic science and technology; beijing 100070; china; 2.department of computer science and technology; beijing institute of electronic science and technology; beijing 100070; china; 3. center of engineering research; beijing institute of electronic science and technology; beijing 100070; china)
..............page:35-36,22
..............page:86-92,62
Design of a Remote Monitor and Control System for LAN
cao hong-long1 mao xiao-yan2 cai wen-feng1 (1.school of electronics & information; suzhou university; suzhou 215021; china; 2. school of mechanical engineering; university of shanghai for science and technology; shanghai 200093; china )
..............page:59-62
..............page:78-82,77