[1] BERNSTEIN D J, BUCHMANN J, DAHMEN E. Post-quantum cryptography[M]. Berlin, Heidelberg: Springer, 2009.
[2] WANG X Y, LIU M J. Survey of lattice-based cryptography[J]. Journal of Cryptologic Reseatch, 2014, 1(1): 13-27.
王小云, 刘明洁. 格密码学研究[J]. 密码学报, 2014, 1(1): 13-27.
[3] WANG H Y, YAO B, SU J, et al. Number-based strings/passwords from imaginary graphs of topological coding for encryption[C]//Proceedings of the 2021 IEEE 4th Advanced Information Management, Communicates, Electronic and Automation Control Conference. Piscataway: IEEE, 2021: 497-501.
[4] YAO B, WANG H Y, SU J, et al. Graphic lattices for con-structing high-quality networks[C]//Proceedings of the 2020 IEEE 5th Information Technology and Mechatronics Engin-eering Conference, Chongqing, Jun 12-14, 2020. Piscataway: IEEE, 2020: 1726-1730.
[5] WANG H Y, XU J, YAO B. Exploring new cryptographical construction of complex network data[C]//Proceedings of the IEEE 1st International Conference on Data Science in Cyberspace, Changsha, Jun 13-16, 2016. Washington: IEEE Computer Society, 2016: 155-160.
[6] WANG H Y, XU J, YAO B. The key-models and their lock-models for designing new labellings of networks[C]//Proceedings of the 2016 IEEE Advanced Information Management, Com-municates, Electronic and Automation Control Conference, Xi??an, Oct 3-5, 2016. Piscataway: IEEE, 2016: 5565-5568.
[7] YAO B, YANG C, YAO M. Coding techniques from distinguishing colorings in topological coding[C]//Proceedings of the 2020 IEEE 9th Joint International Information Technology and Artificial Intelligence Conference, Chongqing, Dec 11-13, 2020. Piscataway: IEEE, 2020: 77-83.
[8] Encoding of Chinese characters: GB2312-80[S]. The Com-pilation of National Standards for Character Sets and Infor-mation Coding. China Standard Press, 1998.
[9] GALLIAN J A. A dynamic survey of graph labeling[J]. The Electronic Journal of Combinatorics, 2016, 18: #DS6.
[10] YAO B, SUN H, WANG H Y. Graph colorings based on n-dimension digital-based strings for information security[C]//Proceedings of the 2020 IEEE International Conference on Information Technology, Big Data and Artificial Intelligence, Chongqing, Nov 6-8, 2020. Piscataway: IEEE, 2020: 458-462.
[11] SHEPPARD D A. The factorial representation of balanced labeled graphs[J]. Discrete Mathematics, 1976, 15(4): 379-388.
[12] DEO N, NIKOLOSKI Z, SURAWEERA F. Generation of graceful trees[C]//Proceedings of the 33rd Southeastern Inter-national Conference on Combinatorics, Graph Theory and Computing, Boca, 2002: 4-8.
[13] YAO B. Graphic lattices and matrix lattices of topological coding[J]. arXiv:2005.03937, 2020.
[14] YAO B, WANG H Y. Graph homomorphisms based on particular total colorings of graphs and graphic lattices[J]. arXiv:2005. 02279v1, 2020.
[15] YAO B, ZHAO M M, ZHANG X H, et al. Topological coding and topological matrices toward network overall security[J]. arXiv:1909.01587v2, 2019.
[16] WANG H Y, YAO B, YAO M. Generalized edge-magic total labellings of models from researching networks[J]. Information Sciences, 2014, 279: 460-467.
[17] YAO B, MA F, WANG X M. Optimal design and randomly topological coloring of dynamic networks[C]//Proceedings of the IEEE 9th Joint International Information Technology and Artificial Intelligence Conference, Chongqing, Dec 11-13, 2020. Piscataway: IEEE, 2020: 226-231.
[18] YAO B, MU Y R, SUN H Z, et al. Algebraic groups for construction of topological graphic passwords in cryptography [C]//Proceedings of the 2018 IEEE 3rd Advanced Information Technology, Electronic and Automation Control Conference, Chongqing, Oct 12-14, 2018. Piscataway: IEEE, 2018: 2211-2216.
[19] WANG H Y, XU J, YAO B. Twin odd-graceful trees towards information security[J]. Procedia Computer Science, 2017, 107: 15-20.
[20] BONDY J A, MURTY U S. Graph theory[M]. Berlin, Hei-delberg: Springer, 2008.
[21] YAO B, WANG H Y, MA F, et al. On real-valued total colorings towards topological authentication in topological coding[C]//Proceedings of the 2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference, Chongqing, Jun 12-14, 2020. Piscataway: IEEE, 2020: 1751- 1756.
[22] YAO B, WANG H Y, SU J, et al. Especial total colorings towards multiple authentications in network encryption[C]//Proceedings of the 2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference, Chongqing, Jun 12-14, 2020. Piscataway: IEEE, 2020: 1617-1623.
[23] YAO B, MU Y R, SUN Y R, et al. Using Chinese characters to generate text-based passwords for information security[J]. arXiv:1907.05406v1, 2019.
[24] ZHANG M J, YANG S H, MU Y R, et al. Hanzi-TB-paws for helping Chinese people to memorize their passwords with longer bytes[C]//Proceedings of the 2019 IEEE 3rd Advanced Information Management, Communicates, Electronic and Automation Control Conference, Chongqing, Oct 11-13, 2019. Piscataway: IEEE, 2019: 1418-1424. |