Computer Science ›› 2017, Vol. 44 ›› Issue (3): 145-149.doi: 10.11896/j.issn.1002-137X.2017.03.032
Previous Articles Next Articles
GUO Ping, FU De-sheng, ZHU Jie-zhong and CHENG Ya-ping
[1] PKIX Working Group.Public key infrastructure (X.509)[EB/OL].The Internet Engineering Task Force (IETF).[2011-8-16].http://www.ietf.org/html.charters/pkix-charter.html. [2] ANITA E A M,VASUDEVAN V,ASHWINI A.A certificate-based scheme to defend against worm hole attacks in multicast routing protocols for MANETs[C]∥Proc of 2011 IEEE International Conference on Communication Control and Computing Technologies.Ramanathapuram:IEEE,2011:407-412. [3] LUO H,KONG J,ZERFOS P,et al.URSA:ubiquitous and robust access control for mobile Ad hoc networks[J].ACM Transactions on Networking,2004,12(6):1049-1063. [4] CHAN A C.Distributed private key generation for identitybased cryptosystems in Ad hoc networks [J].Wireless Communication Letters,2012,1(1):46-48. [5] CCAPKUN S,BUTTYAN L,HUBAUX J P.Self-organizedpublic key management for mobile Ad hoc networks [J].IEEE Transaction on Mobile Computing,2003,2(1):52-64. [6] HAMOUID K.Self-certified based trust establishment scheme in Ad hoc networks [C]∥Proc of the 5th International Con-ference on New Technologies,Mobility and Security.Istanbul:IEEE,2012:1-7. [7] ZIMMERMANN P.The Official PGP User’s Guide [M].MA:MIT Press Cambridge,1995:191-198. [8] EISSA T,RAZAK S A,NGADI M D A.Towards providing a new lightweight authentication and encryption scheme for MANET[J].Wireless Network,2011,17:833-842. [9] YANG K,JIA X H,ZHANG B,et al.Threshold Key Redistribution for dynamic change of authentication group in wireless mesh networks[C]∥Proc of IEEE Global Telecommunications.Miami:IEEE,2010:1151-1156. [10] SHIN Y C,DONG M K,HUN J L,et al.Mechanism for rege-nerating CGA using threshold secret sharing in MANET[C]∥Proc of the 13th International Conference on Advanced Communication Technology.Seoul:IEEE,2012:891-895. [11] LI X,JING Z.A Trust cluster based key management protocol for Ad hoc networks[C]∥Proc of IEEE International Workshop on Anti-counterfeiting,Security,Identification.Xiamen:IEEE,2007:371-376. [12] YANG Y,XUE S Q,LUO M M,et al.A self-adaptive method of task allocation in clustering-based MANETs[C]∥Proc of 2010 IEEE International Conference on Network Operations and Management Symposium.Osaka:IEEE,2010:440-447. [13] QIN N Y,FU A M,CHEN S G.Blind Signature-based Handover Authentication Protocol with Conditional Privacy Preserving in LTE/LTE-A Networks[J].Computer Science,2015,2(8):145-151.(in Chinese) 秦宁元,付安民,陈守国.LTE/LTE-A网络中基于盲签名的具有条件隐私保护的切换认证协议[J].计算机科学,2015,2(8):145-151. [14] GUO P,ZHANG H,FU D S,et al.Hybrid and Lightweight Cryptography for Wireless Sensor Network[J].Computer Science,2012,39(1):14-19.(in Chinese) 郭萍,张宏,傅德胜,等.一种混合轻量型无线传感器网络公钥密码方案[J].计算机科学,2012,39(1):14-19. [15] FENG D G,QIN Y,WANG D,et al.Research on Trust Computing Technology[J].Computer Research and Development,2011,48(8):1332-1349.(in Chinese) 冯登国,秦宇,汪丹,等.可信计算技术研究[J].计算机研究与发展,2011,48(8):1332-1349. [16] LU Z.Research on OPNET Application in Wireless Network Simulation[D].Shanghai:Fudan University,2010 .(in Chinese) 陆智.OPNET在无线网络仿真中的应用研究[D].上海:复旦大学,2010. |
No related articles found! |
|