[1] 冯登国. 计算机通信网络安全. 北京:清华大学出版社, 2001 [2] Dorothy Denning, ”Cryptography and Data Security”, Addison-Wesley. ISBN 0-201-10150-5.[3] M. Bishop and D. Bailey, “A Critical Analys
EI检索, 影响因子:2.631)[2]. Wenxue Li, Ke Wang. Optimal harvesting policy for general stochastic Logistic population model. Journal of Mathematical Analysis and Applications. 368 (2010) 420-428.(SCI检索,