[1] |
HAO Wenjiang, WU Jie.Analysis on Security of Internet of Things[J]. Netinfo Security, 2010, 10(1): 49-50.
|
|
郝文江,武捷. 物联网技术安全问题探析[J]. 信息网络安全,2010,10(1):49-50.
|
[2] |
SADEGHI A R, WACHSMANN C, WAIDNER M.Security and Privacy Challenges in Industrial Internet of Things[C]//IEEE. 52nd ACM/EDAC/IEEE Design Automation Conference, June 8-12, 2015, San Francisco, CA, USA. New Jersey: IEEE, 2015: 1-6.
|
[3] |
GUO Tao, LI Zhitang, PENG Jianxi.Research on Digital Signature Technology[J]. Netinfo Security, 2002, 2(8): 34-36.
|
|
郭涛,李之棠,彭建喜. 数字签名技术[J]. 信息网络安全,2002,2(8):34-36.
|
[4] |
SHAMIR A.Identity-based Cryptosystems and Signature Schemes[C]//Springer. CRYPTO 1984, August 19-22, Santa Barbara, CA, USA. Heidelberg: Springer, 1984: 47-53.
|
[5] |
AL-RIYAMI S S, PATERSON K G. Certificateless Public Key Cryptography[C]//Springer. International Conference on the Theory and Application of Cryptology and Information Security, November 30-December 4, 2003, Taipei, Taiwan, China. Heidelberg: Springer, 2003: 452-473.
|
[6] |
YUM D H, LEE P J.Generic Construction of Certificateless Signature[C]//Springer. Australasian Conference on Information Security and Privacy, July 13-15, 2004, Sydney, Australia. Heidelberg: Springer, 2004: 200-211.
|
[7] |
HUANG Xinyi, SUSILO W, MU Yi, et al.On the Security of Certificateless Signature Schemes from Asiacrypt 2003[C]//Springer. International Conference on Cryptology and Network Security, December 14-16, 2005, Xiamen, China. Heidelberg: Springer, 2005: 13-25.
|
[8] |
ZHANG Zhenfeng, WONG D S, XU Jing, et al.Certificateless Public-key Signature: Security Model and Efficient Construction[C]//Springer. International Conference on Applied Cryptography and Network Security, June 6-9, 2006, Singapore. Heidelberg: Springer, 2006: 293-308.
|
[9] |
LIU J K, AU M H, SUSILO W.Self-generated-certificate Public Key Cryptography and Certificateless Signature/Encryption Scheme in the Standard Model: Extended Abstract[C]//ACM. 2nd ACM Symposium on Information, Computer and Communications Security, March 20-22, 2007, Singapore. New York: ACM, 2007: 273-283.
|
[10] |
HE Debiao, CHEN Jianhua, ZHANG Rui.An Efficient and Provably-secure Certificateless Signature Scheme without Bilinear Pairings[J]. International Journal of Communication Systems, 2012, 25(11): 1432-1442.
|
[11] |
DODIS Y, KATZ J, XU Shouhuai, et al.Key-insulated Public Key Cryptosystems[C]//Springer. International Conference on the Theory and Applications of Cryptographic Techniques, April 28-May 2, 2002, Amsterdam, Netherlands. Heidelberg: Springer, 2002: 65-82.
|
[12] |
GONZÁLEZ-DELEITO N, MARKOWITCH O, DALL’OLIO E. A New Key-insulated Signature Scheme[C]//Springer. International Conference on Information and Communications Security, October 27-29, 2004, Malaga, Spain. Heidelberg: Springer, 2004: 465-479.
|
[13] |
LE Zhengyi, OUYANG Yi, FORD J, et al.A Hierarchical Key-insulated Signature Scheme in the CA Trust Model[C]//Springer. International Conference on Information Security, September 27-29, 2004, Palo Alto, CA, USA. Heidelberg: Springer, 2004: 280-291.
|
[14] |
ZHOU Yuan, CAO Zhenfu, CHAI Zhenchuan.Identity Based Key Insulated Signature[C]//Springer. International Conference on Information Security Practice and Experience, April 11-14, 2006, Hangzhou, China. Heidelberg: Springer, 2006: 226-234.
|
[15] |
WENG Jian, CHEN Kefei, LIU Shengli, et al.Identity-based Key-insulated Signature without Random Oracles[C]//IEEE. 2006 International Conference on Computational Intelligence and Security, November 3-6, 2006, Guangzhou, China. New Jersey: IEEE, 2006: 1253-1258.
|
[16] |
WENG Jian, LI Xiangxue, CHEN Kefei, et al.Identity-based Parallel Key-insulated Signature without Random Oracles[J]. Journal of Information Science & Engineering, 2008, 24(4): 1143-1157.
|
[17] |
WAN Zhongmei, LAI Xuejia, WENG Jian, et al.Certificateless Key-insulated Signature without Random Oracles[J]. Journal of Zhejiang University-Science A, 2009, 10(12): 1790-1800.
|
[18] |
CHEN Yanan, XU Weixiang, XIONG Hu.Strongly Secure Certificateless Key-insulated Signature Secure in the Standard Model[J]. Annals of Telecommunications-Annales Des Télécommunications, 2015, 70(9-10): 395-405.
|
[19] |
WANG Shuo, CHENG Xiangguo, CHEN Yameng, et al.Research on Key-insulated Group Signature Scheme[J]. Netinfo Security, 2017, 17(4): 40-45.
|
|
王硕,程相国,陈亚萌,等. 密钥隔离的群签名方案研究[J]. 信息网络安全,2017,17(4):40-45.
|