Computer Science ›› 2016, Vol. 43 ›› Issue (10): 166-171.doi: 10.11896/j.issn.1002-137X.2016.10.031
Previous Articles Next Articles
REN Chao-qun and XU Ming
[1] Li L C,Liu R S.Securing Cluster-Based Ad Hoc Networks with Distributed Authorities[J].IEEE Transactionson on Wireless Communications,2010,9(10):3072-3081 [2] Guo M H,Liaw H T,Deng D J,et al.Cluster-based securecommunication mechanism in wireless ad hoc networks[J].Net Information Security,2010,4(4):352-360 [3] Islam M R,Azad S,Morshed M M.A Secure Communication Suite for Cluster-based Underwater Surveillance Networks[C]∥2014 International Conference on IEEE Electrical Engineering and Information & Communication Technology (ICEEICT).2014:1-5 [4] Lu H,Li J,Guizani M.Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks[J].IEEE Transactions on Parallel & Distributed Systems ,2014,25(3):750-761 [5] Zhang Rui,Shi Jing,Zhang Yan-chao,et al.Secure Top-k Query Processing in Unattended[J].IEEE Transactions on Vehicular Technology,2014,3(9):4681-4693 [6] Vaidya B,Pyun J Y,Pan S,et al.Secure framework for intergrated multipath MANTE with internet[C]∥Internation Symposium on Application and the Internet.2008:83-88 [7] Bellare M,Namprempre C,Neven G.Security Proofs for Identity Based Identification and Signature Schemes[J].Journal of Cryptology,2009,22(1):1-61 [8] Yasmin R,Ritter E,Wang G.An Authentication Framework for Wireless Sensor Networks using Identity-Based Signatures[C]∥2010 IEEE 10th International Conference on Computer and Information Technology (CIT).IEEE,2010:882-889 [9] Kiliani H.An Efficient and Transparent One-Time Authentication Protocol with Non-interactive Key Scheduling and Update[C]∥IEEE International Conference on Advanced Information Networking & Applications.IEEE,2014:351-358 [10] Krishna R.Cookie-based acceleration of an authentication protocol:US,US8887233[P].2014 [11] Guo C,Zhang Z J,Zhu L H,et al.A novel secure group RFID authentication protocol[J].Journal of China Universities of Posts & Telecommunications,2014,21(1):94-103 [12] Yang Shi-ping.Security protocol and BAN Logic [D].Guiyang:Guizhou University,2007(in Chinese ) 杨世平.安全协议及其BAN逻辑分析研究[D].贵阳:贵州大学,2007 [13] Yang Tao.Based proxy signature vehicle from research networking privacy [D]:Beijing:Beijing University,2013(in Chinese)杨涛.基于代理签名的车辆自组网的隐私保护研究[D].北京:北京大学,2013 [14] He Dao-jing.Key Technology of wireless network security [D].Hangzhou:Zhejiang University,2012(in Chinese) 何道敬.无线网络安全的关键技术研究[D].杭州:浙江大学,2012 |
No related articles found! |
|