YANG Shuzi,WU Bo,HU Chunhua,et al.Network manufacturing and enterprise integration[J].China Mechanical Engineering,2000,11(1-2):45-48(in Chinese).[杨叔子,吴波,胡春华,等.网络化制造与企业集成[J].中国机械工程,2000,11(1-2):45-48.]
[3]
LI Jinku,ZHANG Deyun,ZHANG Yong.Research of user authentication mechanism and its security analysis[J].Application Research of Computer,2001,(2):126-128(in Chinese).[李金库,张德运,张勇.身份认证机制研究及其安全性分析[J].计算机应用研究,2001,(2):126-128.]
[4]
WILLIAM S.Cryptography and network security: Principles and Practice (Second Edition)[M].Beijing:Electronic Industry Press,2001(in Chinaese).[WILLIAM S.密码编码学与网络安全:原理与实践(第二版)[M].北京:电子工业出版社,2001.]
[5]
CHRISTOPHER B,MATTHEW B,JONATHAN C, et al.Professional Windows DNA[M].Beijing:Electronic Industry Press,2001(in Chinese).[CHRISTOPHER B,MATTHEW B,JONATHAN C,等.Windows分布式Web应用程序编程指南[M].北京:电子工业出版社,2001.]