2Douglas R Stinson.Cryptography theoy and practice[M].Beijing:Publishing House of Electronics Industry,2002.135-139.
3Davies D W.Advances in cryptology-eurocrypt91 [C].Berlin:Springer-Verlag,1991.328-336.
4Mell P,Marks D,McLarnon M.A denial of service resistant intrusion detection architecture[J].Computer Networks.2000,34(4):641-658.
5Curry D,Dehar H.Intrusion detection message exchange format data model and extensible markup language(XML)documenttype definition[N].draft-ietf-idwg-idmef-xml-03,2001- 02-03.
6A.K.Dey:Understanding and Using Context,Personal and Ubiquitous Computing,Special Issue on Situated Interaction and Ubiquitous Computing,2001.