[1] |
YUN A, CHEON J H, KIM Y.On Homomorphic Signatures for Network Coding[J]. IEEE Transactions on Computers, 2010, 59(9):1295-1296.
|
[2] |
ZHAO F,KALKER T,MEDARED M.Signature for Content Distribution with Network Coding[C]//IEEE.Symposium on Information Theory,November 12-15, 2006, Washington.New York:IEEE,2007:556-560.
|
[3] |
ZHOU Xiuyuan, WANG Caifen, LUO Hai.Multi-source Network Coding Signature Scheme Based on RSA[J]. Computer Engineering and Design, 2012, 33(5): 1752-1756.
|
|
周秀媛,王彩芬,罗海. 基于RSA的多源网络编码签名方案[J]. 计算机工程与设计,2012,33(5):1752-1756.
|
[4] |
NIU ShuFen, WANG CaiFen.Homomorphic Signature Algorithm for Multi-source Linear Network Coding[J]. Computer Engineering, 2012, 38(2): 126-128.
|
|
牛淑芬,王彩芬. 多源线性网络编码的同态签名算法[J]. 计算机工程,2012,38(2):126-128.
|
[5] |
LIU Guangjun, WANG Bin.A Secure Network Coding Scheme Against Internal/External Pollution Attacks[J]. China Communications, 2013, 10(8): 100-110.
|
|
刘光军,王斌. 抗代内/外污染攻击的安全网络编码方案[J]. 中国通信,2013,10(8):100-110.
|
[6] |
LUO Q, YANG G, SHE K, et al.Quantum Homomorphic Signature Using Coherent States[C]// IEEE. 2016 2nd IEEE International Conference on Computer and Communications (ICCC). October 14-17, 2016. Chengdu, China.New York:IEEE, 2017:1052-1055.
|
[7] |
PEI Hengli, SHANG Tao, LIU Jianwei.A Secure Network Coding Method Based on Time Stamp and Homomorphic Signature[J]. Journal of Computation, 2013, 34(4): 28-35.
|
|
裴恒利,尚涛,刘建伟. 融合时间戳和同态签名的安全网络编码方法[J]. 通信学报,2013,34(4):28-35.
|
[8] |
MENG Yunfan, SUN Guangbiao, XING Jie, et al.Wireless Body Area Network Security Signature Scheme Based on Network Coding and ECC[J]. Telecommunications Technology, 2015, 55(6): 605-610.
|
|
蒙云番,孙光昊,邢杰,等. 基于网络编码和ECC的无线体域网安全签名方案[J]. 电讯技术,2015,55(6): 605-610.
|
[9] |
LUO Peng, YANG Xiaoyuan.Multi-PKG Identity-based Encryption Scheme Based on Ring Signature[J]. Journal of Shandong Uuiversity(Natural Sciences), 2017, 52(6): 64-68.
|
|
罗鹏,杨晓元. 基于环签名的支持多PKG身份基加密方案[J]. 山东大学学报(理学版) ,2017,52(6):64-68.
|
[10] |
LIU G J,LIU B Y,LIU X M, et al.Low-Complexity Secure Network Coding Against Wiretapping Using Intra/Inter-generation Coding[J]. China Communications,2015, 12(6):116-125.
|
[11] |
LEE S H, MARIO G, HUGO K, et al.Performance Evaluation of Secure Network Coding Using Homomorphic Signature[C]//IEEE. 2011 International Symposium on Networking Coding, July 25-27, 2011,Beijing, China.New York: IEEE, 2011:1-6.
|
[12] |
HE M, CHEN L, WANG H,et al.Survey on Secure Transmission of Network Coding in Wireless Networks[C]//IEEE. 2012 International Conference on Computer Science and Service System, August 11-13, 2012, Nanjing, China.New York:IEEE,2012:1216-1219.
|
[13] |
PENG Yong, CHEN Yuqiang, YAN Wenjie.A Secure Multi-source Network Coding Signature Algorithm[J]. Computer Engineering and Applications, 2012, 48(30): 135-139.
|
|
彭勇,陈愈强,严文杰. 一种安全的多源网络编码签名算法[J]. 计算机工程与应用,2012,48(30):135-139.
|
[14] |
PENG Tianli, SHANG Tao, LIU Jianwei.Network Coded Signature Scheme for Anti-generation Pollution Attack[J]. Beijing Aerospace Journal, 2015, 41(4): 721-726.
|
|
彭天丽,尚涛,刘建伟. 抗代间污染攻击的网络编码签名方案[J]. 北京航空航天大报,2015,41(4):721-726.
|
[15] |
ZHOU Zhaobin, XU Li.Anti-pollution Network Coding Scheme Based on Digital Signature[J]. Journal of Computer Systems, 2016, 25(6): 185-190.
|
|
周赵斌,许力. 基于数字签名的防污染网络编码方案[J]. 计算机系统应用,2016,25(6):185-190.
|
[16] |
FAN C I, SUN W Z, HUANG V S.Provably Secure Randomized Blind Signature Scheme Based on Bilinear Pairing[J]. Computers and Mathematics with Applications,2010,60(2): 285-293.
|
[17] |
WANG Wenqiang, CHEN Shaozhen.An Identity-based Efficient Ring Signature Scheme[J]. Journal of Computer Applications, 2009, 29(11): 2990-2992.
|
|
王文强,陈少真. 一种基于身份的高效环签名方案[J]. 计算机应用,2009,29(11):2990-2992.
|
[18] |
PENG Yong, YAN Wenjie, CHEN Yuqiang.A Multi-source Network Coded Homomorphic Signature Algorithm[J]. Journal of Hefei University of Technology(Natural Science), 2014, 37(3): 310-313.
|
|
彭勇,严文杰,陈俞强. 一种多源网络编码同态签名算法[J]. 合肥工业大学学报(自然科学版) ,2014,37(3):310-313.
|
[19] |
LI Jianmin, YU Huifang, ZHAO Chen.Self-certified Blind Signcryption Protocol for UC Security[J]. Journal of Frontiers of Computer Science and Technology, 2017, 11(6): 932-940.
|
|
李建民,俞惠芳,赵晨. UC安全的自认证盲签密协议[J]. 计算机科学与探索, 2017,11(6):932-940.
|