Computer Science ›› 2018, Vol. 45 ›› Issue (6A): 380-382.
• Information Security • Previous Articles Next Articles
HUO Shi-wei,ANG Wen-jing,LI Jing-zhi,SHEN Jin-shan
CLC Number:
[1]ZHOU L,HAAS Z.Securing Ad Hoc Networks[J].Microcomputer Applications,2005,13(6):24-30. [2]YI S,KRAVETS R.MOCA:MObile Certificate Authority for Wireless Ad Hoc Networks[C]∥Pki Research Workshop Program.2004:65-79. [3]SEN J,SUBRAMANYAM H.An Efficient Certificate Authority for Ad Hoc Networks[M]∥Distributed Computing and Internet Technology.Springer Berlin Heidelberg,2007:97-109. [4]吴平,王保云,徐开勇.基于身份的Ad Hoc网络密钥管理方案[J].计算机工程,2008,34(24):143-145. [5]施荣华,樊翔宇.基于身份认证的Ad Hoc密钥协商方案[J].中南大学学报(自然科学版),2010,41(6):2236-2239. [6]DU H Z,WEN Q Y.Efficient traceable identity-based signature scheme[J].Journal on Communications,2009,30(8):56-61. [7]杜红珍,温巧燕.高效的可追踪的基于ID的签名方案[J].通信学报,2009,30(8):56-61. [8]周福才,徐剑,徐海芳,等.Ad hoc网络中基于双线性配对的STR组密钥管理协议研究[J].通信学报,2008,29(10):117-125. |
[1] | JIAN Qi-rui, CHEN Ze-mao, WU Xiao-kang. Authentication and Key Agreement Protocol for UAV Communication [J]. Computer Science, 2022, 49(8): 306-313. |
[2] | CHEN Yan-bing, ZHONG Chao-ran, ZHOU Chao-ran, XUE Ling-yan, HUANG Hai-ping. Design of Cross-domain Authentication Scheme Based on Medical Consortium Chain [J]. Computer Science, 2022, 49(6A): 537-543. |
[3] | LIANG Zhen-zhen, XU Ming. Key Agreement Scheme Based on Ocean Acoustic Channel [J]. Computer Science, 2022, 49(6): 356-362. |
[4] | SONG Tao, LI Xiu-hua, LI Hui, WEN Jun-hao, XIONG Qing-yu, CHEN Jie. Overview of Research on Security Encryption Authentication Technology of IoV in Big Data Era [J]. Computer Science, 2022, 49(4): 340-353. |
[5] | WANG Xiang-yu, YANG Ting. Routing Directory Server Defined by Smart Contract [J]. Computer Science, 2021, 48(6A): 504-508. |
[6] | CAO Meng, YU Yang, LIANG Ying, SHI Hong-zhou. Key Technologies and Development Trends of Big Data Trade Based on Blockchain [J]. Computer Science, 2021, 48(11A): 184-190. |
[7] | LIAN Wen-juan, ZHAO Duo-duo, FAN Xiu-bin, GENG Yu-nian, FAN Xin-tong. CFL_BLP_BC Model Based on Authentication and Blockchain [J]. Computer Science, 2021, 48(11): 36-45. |
[8] | NI Liang, WANG Nian-ping, GU Wei-li, ZHANG Qian, LIU Ji-zhao, SHAN Fang-fang. Research on Lattice-based Quantum-resistant Authenticated Key Agreement Protocols:A Survey [J]. Computer Science, 2020, 47(9): 293-303. |
[9] | WU Yu-hong and HU Xiang-dong. Study on Security of Industrial Internet Network Transmission [J]. Computer Science, 2020, 47(6A): 360-363. |
[10] | MO Tian-qing and HE Yong-mei. SIP Authentication Key Agreement of Protocol Based on Certificateless [J]. Computer Science, 2020, 47(6A): 413-419. |
[11] | CHEN Meng-dong, GUO Dong-sheng, XIE Xiang-hui, WU Dong. Design and Implementation of Rule Processor Based on Heterogeneous Computing Platform [J]. Computer Science, 2020, 47(4): 312-317. |
[12] | ZHAO Nan,ZHANG Guo-an. Authenticated Privacy Protection Scheme Based on Certificateless Ring Signcryption in VANET [J]. Computer Science, 2020, 47(3): 312-319. |
[13] | LI Zhao-bin, CUI Zhao, WEI Zhan-zhen, ZHAO Hong, GUO Chao. Wireless Network Authentication Method Based on Physical Layer Channel Characteristics [J]. Computer Science, 2020, 47(12): 267-272. |
[14] | WANG Chun-dong, LUO Wan-wei, MO Xiu-liang, YANG Wen-jun. Survey on Mutual Trust Authentication and Secure Communication of Internet of Vehicles [J]. Computer Science, 2020, 47(11): 1-9. |
[15] | CHENG Qing-feng, LI Yu-ting, LI Xing-hua, JIANG Qi. Research on Application of Cryptography Technology for Edge Computing Environment [J]. Computer Science, 2020, 47(11): 10-18. |
|