[1] 冯登国. 计算机通信网络安全. 北京:清华大学出版社, 2001 [2] Dorothy Denning, ”Cryptography and Data Security”, Addison-Wesley. ISBN 0-201-10150-5.[3] M. Bishop and D. Bailey, “A Critical Analys
[2]徐红,刘竹琴,石延梅.物距像距法测凹透镜焦距时再次成实象的讨论[J].延安大学学报(自然科学版),2005,24(3):41-42.XU H, LIU Z Q, SHI Y M. Discussion on the real imaging again when measuring the focal length o