[1] |
Wang Shengbao,Cao Zhenfu,Dong Xiaolei. Provably secure identitybased authenticated key agreement protocols in the standard mode[J]. Chinese Journal of Computers,2007, 30(10):18421854. (in Chinese)
|
[2] |
Wang Xiaofen, Chen Yuan, Xiao Guozhen. Analysis and improvement of an IDbased authenticated key agreement protocol[J].Journal on Communications, 2008, 29(12):1621. (in Chinese)
|
[3] |
Li Z, Zhan G, Ye X. Towards an antiinference (k,l)anonymity model with value association rules[C]∥Proc of the 17th International Conference on Database and Expert Systems Applications, 2006:883893.
|
[4] |
Nogueira M, Silva H, Santos A, et al. A security management architecture for supporting routing services on WANETs[J]. IEEE Transactions on Network and Service Management, 2012, 3(8):113.
|
[5] |
Hankerson D,Menezes A,Vanstone S.Guide to elliptic curve cryptography[M]. Berlin:Springer, 2004.
|
[6] |
Kar J, Majhi B. A secure twoparty identity based key exchange protocol based on elliptic curve discrete logarithm problem[J]. Journal of Information Assurance and Security, 2009, 5(1):473482.
|
[7] |
Koblitz N. Elliptic curve cryptosystem[J]. Mathematics of Computation, 1987, 48(17):203209.
|
[8] |
Miller V S. Use of elliptic curves in cryptography[C]∥Proc of the Advances in CryptologyCrypto’85, 1985:417426.
|
[9] |
Dai D Y, Xu H B. Key predistribution approach in wireless sensor networks using LU matrix[J]. IEEE Sensors Journal, 2010, 10(8):13991409.
|
[10] |
Zhang P, Zhang Y T. Analysis of using interpulse intervals to generate 128bit biometric random binary sequences for securing wireless body sensor networks [J]. IEEE Transactions on Information Technology in Biomedicine, 2012, 16(1):176182.
|
|
附中文参考文献:
|
[1] |
王圣宝, 曹珍富, 董晓蕾. 标准模型下可证安全的身份基认证密钥协商协议[J]. 计算机学报, 2007, 30(10):18421852.
|
[2] |
汪小芬,陈原,肖国镇.基于身份的认证密钥协商协议的安全分析与改进[J]. 通信学报, 2008, 29(12):1621.
|