[1] Zhang Jiwen. C-curves and surfaces[J]. Graphical Models and Image Processing, 1999, 61(1): 2-15. [2] Oruc H, Phillips G H. q-Bernstein polynomials and Bézier curves[J]. Journal of Computational and Applied Mathematics, 2003, 151(1): 1-12. [3] 丁敏, 汪国昭. 基于三角和代数多项式的T-Bézier曲线[J]. 计算机学报, 2004, 27(8): 1021-1026. Din Min, Wang Guozhao. T-Bézier curves based on algebraic and trigonometric polynomials[J]. Chinese Journal of Computers, 2004, 27(8): 1021-1026. [4] 吴晓勤, 韩旭里. 三次Bézier曲线的扩展[J]. 工程图学学报, 2005, 26(6): 98-102. Wu Xiaoqin, Han Xuli. Extension of cubic Bézier curve [J]. Journal of Engineering Graphics, 2005, 26(6): 98-102. [5] 韩西安, 马逸尘, 黄希利. 拟三次Bézier曲线的形状调整[J]. 西安交通大学学报, 2007, 41(8): 903-906. Han Xian, Ma Yichen, Huang Xili. Shape modification of cubic quasi-Bézier curve[J]. Journal of Xian Jiaotong University, 2007, 41(8): 903-906. [6] 秦新强, 胡钢, 张素霞. 三次Bézier曲线的新扩展及其应用[J]. 计算机工程与应用, 2008, 44(2): 112-115. Qin Xinqiang, Hu Gang, Zhang Suxia. New extension of the cubic Bézier curve and its applications[J]. Computer Engineering and Application, 2008, 44(2): 112-115. [7] Wang Guozhao, Yang Qinmin. Planar cubic hybrid hyperbolic polynomial curve and its shape classification [J]. Progress in Natural Science, 2004, 14(1): 41-46. [8] Hu Shimin, Tong Roufeng, Ju Tao, et al. Approximate merging of a pair of Bézier curves[J]. Computer Aided Design, 2001, 33 (2): 125-136. [9] Tai C L, Hu Shimin, Huang Qixing. Approximate merging of B-spline curves via knot adjustment and constrained optimization[J]. Computer Aided Design, 2003, 35(8): 893-899. [10] 郭清伟. 两相邻Bézier曲线的近似合并[J]. 计算机辅助设计与图形学学报, 2005, 17(10): 2275-2280. Guo Qingwei. Approximate merging of a pair of Bézier curves[J]. Journal of Computer Aided Design & Computer Graphics, 2005, 17(10): 2275-2280. [11] Cheng Min, Wang Guojin. Approximate merging of multiple Bézier segments[J]. Progress in Natural Science, 2008, 18(6): 757-762. (上接第67页) [3] 张华, 温巧燕, 袁征. 一个新的RDP密码套件[J]. 北京邮电大学学报, 2008, 31(6): 50-53. Zhang Hua, Wen Qiaoyan, Yuan Zheng. A new ciphersuite for remote desktop protocol [J]. Journal of Beijing University of Posts and Telecommunications, 2008, 31(6): 50-53. [4] Ahn L V, Blum M, Hopper N J, et al. CAPTCHA: using hard AI problems for security //Advances in Cryptology-EuroCrypt 2003. Warsaw: Springer, 2003: 294-311. [5] Shoup V. Sequences of games: a tool for taming complexity in security proofs .(2004) . http://eprint. iacr. org/2004/332. [6] Laih C S, Ding L, Huang Y M. Password-only authenticated key establishment protocol without public key cryptography [J]. Electronics Letters, 2005, 41(4): 185-186. [7] Tang Qiang, Mitchell C. Enhanced password-based key establishment protocol.(2005) . http://eprint. iacr. org/2005/141. [8] Ergular I, Anarim E. A password-based key establishment protocol with symmetric key cryptography//WIMOB’08. Avignon: IEEE, 2008: 543-548. |