[1] Pecora L M, Carroll T L 1990 Phys. Rev. Lett. 64 821
[2] Pecora L M, Carroll T L 1991 Phys. Rev. Lett. 44 2374
[3] Cuomo K M, Oppenheim A V 1993 Phys. Rev. Lett. 71 65
[4] Rajesh S, Nandakumaran V M 2006 Physica D 213 113
[5] Mark Stamp, Peter Stavroulakis 2010 Handbook of Information and Communication Security (German: Springer, Link) p451-478.
[6] Fang J Q 2010 Journal of Systems Engineering Sin. 25(6) (in Chinese) [方锦清 2010系统工程学报 25(6)]
[7] Pecora M, Carroll T L 1990 Phys Rev Lett. 64 821
[8] Wu X G, Wang Z X 2009 Chao, Solitons & Fractals 39 689
[9] GHM Van Tartwijk, Lenstra D 1995 Quantum Semiclass. Opt. 7 87
[10] Lin F Y, Liu J M 2003 IEEE Journal of Quantum Electronics 39 562