[1] |
LI Huixian, PANG Liaojun, WANG Yumin. Key Management Scheme without Secure Channel for Ad Hoc Networks[J]. Journal on Communications January, 2010,3 1 (l):l12-117.
|
[2] |
ZHOU L, J HASS Z. Securing Ad Hoc networks[J]. IEEE Network: Special Issue on Network Security, 1999,13(6):24-30.
|
[3] |
DENG H, MUKHERJEE A, AGRAWAL D P.Threshold and Identity Based Key Management and Authentication for Wireless Ad Hoc Networks[C]//IEEE. IEEE International Conferences on Information Technology:Coding and Computer(ITCC'04), April5-7, 2004, LasVegas, Nevada. New Jersey: IEEE, 2004: 107-110.
|
[4] |
YU F R, TANG H, MASON P C, et al.A Hierarchical Identity-based Key Management Scheme in Tactical Mobile Ad Hoc Networks[J]. IEEE Transactions on, Network and Service Management, 2010, 7(4): 258-267.
|
[5] |
FENG T, WANG Y, MA J.A New Ad Hoc Group Key Agreement Scheme Based on ECC[J]. Acta Electronica Sinica, 2009, 37(5): 918-924.
|
[6] |
FENG J, WANG X, SUN H.Efficiently Computable Endomorphism for Genus 3 Hyperelliptic Curve Cryptosystems[J]. Information Processing Letters, 2013, 113(12): 405-408.
|
[7] |
XU Peng, CUI Guohua, ZHENG Minghui.Efficiently Non-Authenticated Group Key Management Protocol Withstand Interruption Attack[J]. Journal on Communications, 2009, 30(l0):75-80.
|
[8] |
HOFFSTEIN J, HOWGRAVE-GRAHAM N, PIPHER J, et al.Practical Lattice-Based Cryptography: NTRUEncrypt and NTRUSign[M]. The LLL Algorithm. Berlin: Heidelberg Springer, 2009: 349-390.
|
[9] |
吴平,徐开勇.基于身份的Ad Hoc网络密钥管理研究与仿真[D].郑州:解放军信息工程大学,2008.
|
[10] |
杜春来,胡铭曾,张宏莉.在椭圆曲线域中基于身份认证的移动ad hoc密钥管理框架[J].通信学报,2007,28(12):53-59.
|
[11] |
冯阳,汪学明. 基于HECC 的门限群签密研究[J]. 通信技术, 2015, 48(5): 607-610.
|
[12] |
HUANG Q, YANG G, WONG D S, et al.A New Efficient Optimistic Fair Exchange Protocol without Random Oracles[J]. International Journal of Information Security, 2012, 11(1): 53-63.
|
[13] |
YOUN T Y, CHANG K Y.ID-based Optimistic Fair Exchange Scheme Based on RSA[J]. ETRI Journal, 2014, 36(4): 673-681.
|
[14] |
陆卫新,汪学明. 超椭圆曲线上的 Ate 对变种及其计算的研究[J]. 计算机工程与设计,2014,35(5): 1578-1582.
|
[15] |
BU S, KOU H.A New Ad Hoc Group Key Agreement Scheme[C]//IEEE. Computer Science and Network Technology (ICCSNT), 2011 International Conference on IEEE, December 24-26,2011,Harbin,China.New Jersey: IEEE, 2011 : 1558-1562.
|
[16] |
ARSHAD H, NIKOOGHADAM M.An Efficient and Secure Authentication and Key Agreement Scheme for Session Initiation Protocol Using ECC[J]. Multimedia Tools and Applications, 2016, 75(1): 181-197.
|
[17] |
GOPE P, HWANG T.An Efficient Mutual Authentication and Key Agreement Scheme Preserving Strong Anonymity of the Mobile User in Global Mobility Networks[J]. Journal of Network and Computer Applications, 2016(62) : 1-8.
|
[18] |
丁瑶,于志强,唐凌,等. 一种基于椭圆曲线的组密钥管理方法[J]. 计算机应用,2011,31(A01): 88-90.
|
[19] |
HE D, KUMAR N, CHILAMKURTI N.A Secure Temporal-Credential-based Mutual Authentication and Key Agreement Scheme with Pseudo Identity for Wireless Sensor Networks[J]. Information Sciences, 2015(321): 263-277.
|
[20] |
GOPE P, HWANG T.Enhanced Secure Mutual Authentication and Key Agreement Scheme Preserving User Anonymity in Global Mobile Networks[J]. Wireless Personal Communications, 2015, 82(4): 2231-2245.
|
[21] |
ZHANG L, ZHU S.Robust ecc-based Authenticated Key Agreement Scheme with Privacy Protection for Telecare Medicine Information Systems[J]. Journal of Medical Systems, 2015, 39(5): 1-11.
|
[22] |
ARSHAD H, TEYMOORI V, NIKOOGHADAM M, et al.On the Security of a Two-factor Authentication and Key Agreement Scheme for Telecare Medicine Information Systems[J]. Journal of Medical Systems, 2015, 39(8): 1-10.
|