Computer Science ›› 2015, Vol. 42 ›› Issue (1): 137-141.doi: 10.11896/j.issn.1002-137X.2015.01.032
Previous Articles Next Articles
GUO Song-hui, NIU Xiao-peng and WANG Yu-long
[1] 杨力,张俊伟,马建峰.改进的移动计算平台直接匿名证明方案[J].通信学报,2013,34(6):69-75 [2] 吴一尘,鲍苏苏.基于对称密钥加密的RSN密钥协商改进方案[J].计算机技术与发展,2013,23(6):132-135 [3] 唐祚波,缪祥华.一种三方认证密钥协商协议的分析与改进 [J].计算机工程,2013,39(1):139-143 [4] 李丽琳,刘柱文.认证密钥协商协议的研究与分析[J].计算机安全,2013,4:43-46 [5] 刘唐,汪小芬,肖国镇.一个强安全的无证书密钥协商协议的安全性分析与改进[J].计算机科学,2012,39(12):73-76 [6] Al-Riyami S S,Paterson K.Certificateless Public Key Cryptography[C]∥Advances in Cryptology-ASIACRYPT’03.Berlin:Springer-Verlag,2003:452-473 [7] Mokhtarnameh R,Ho S B,Muthuvelu N.An Enhanced Certificatelss Authenticated Key Agreement Protocol[C]∥Proc.of 13th International Conference on Advanced Communication Technology.Piscataway,NJ,USA:IEEE Press,2011:802-806 [8] 杨浩民,张尧学,周悦芝.基于双线性对的无证书两方认证密钥协商协议[J].清华大学学报:自然科学版,2012,2(9):1293-1297 [9] 舒剑.可证安全的无证书两方认证密钥协商协议[J].小型微型计算机系统,2012,3(9):2056-2063 [10] Mandt T K.Certificateless authenticated two-party key agreement protocol [D].Oppland Gjovik University College,2006 [11] 朱志馨,董晓蕾.高效安全的无证书密钥协商方案[J].计算机应用研究,2009,26(12):4787-4790 [12] Gao Meng,Zhang Fu-tai.Key-compromise Impersonation At-tacks on Some Certificateless Key Agreement Protocols and Two Improved Protocols[C]∥Proc.of the 1st International Workshop on Education Technology and Computer Science.Wuhan,China,2009:62-66 [13] 曹雪菲,寇卫东,樊凯,等.无双线性对的基于身份的认证密钥协商协议[J].电子与信息学报,2009,1(5):1241-1244 [14] 潘进,刘小琼,李国朋.无双线性对的无证书两方认证密钥协商协议 [J].计算机应用研究,2012,9(6):2240-2243 [15] 刘文浩,许春香.无证书两方密钥协商方案[J].软件学报,2011,2(11):2843-2852 [16] 张磊,张福泰.一类无证书签名方案的构造方法 [J].计算机学报,2009,2(5):940-945 |
No related articles found! |
|