Computer Science ›› 2015, Vol. 42 ›› Issue (7): 186-190.doi: 10.11896/j.issn.1002-137X.2015.07.041
Previous Articles Next Articles
QIAN Qi-feng CHENG Chun-ling
[1] Islam K,Shen W,Wang X.Wireless sensor network reliability and security in factory automation:A survey[J].IEEE Transactions on Systems,Man,and Cybernetics,Part C:Applications and Reviews,2012,42(6):1243-1256 [2] Wei G,Yang X,Shao J.Efficient certificateless authenticatedasymmetric group key agreement protocol[J].KSII Transactions on Internet and Information Systems,2012,6(12):3352-3365 [3] Lu C F,Wu T C,Hsu C L.Certificateless authenticated group key agreement scheme with privacy-preservation for resource-limited mobile devices[J].International Journal of Innovative Computing Information and Control,2012,8(1B):599-615 [4] Al-Riyami S,Paterson K.Certificateless public key cryptography[C]∥Proc of 9th International Conference on the Theory and Application of Cryptology and Information Security.Taipei,Taiwan,2003:205-217 [5] Cao C,Ma J,Moon S.Provable efficient certificateless group key exchange protocol[J].Wuhan University Journal of Natural Scie-nces,2007,12(1):41-45 [6] Heo S,Kim Z,Kim K.Certificateless authenticated group keyagreement protocol for dynamic groups[C]∥Proc of Global Telecommunications Conference(GLOBECOM’07).Washington,USA,2007:464-468 [7] Lee E J,Lee S E,Yoo K Y.A certificateless authenticated group key agreement protocol providing forward secrecy[C]∥Proc of International Symposium on Ubiquitous Multimedia Computing(UMC’08).Hobart,Australia,2008:124-129 [8] Geng M,Zhang F,Gao M.A secure certificateless authenticated group key agreement protocol[C]∥Proc of International Conference on Multimedia Information Networking and Security(MINES’09).Wuhan,China,2009:342-346 [9] Teng J,Wu C.A provable authenticated certificateless groupkey agreement with constant rounds[J].Journal of Communications and Networks,2012,4(1):104-110 [10] Yang G,Tan C H.Certificateless public key encryption:A new generic construction and two pairing-free schemes[J].Theoretical Computer Science,2011,412(8):662-674 [11] Kim Y,Perrig A,Tsudik G.Tree based group key agreement[J].ACM Transactions on Information and System Security (TISSEC),2004,7(1):60-96 [12] Kalpakis K.Everywhere sparse approximately optimal minimum energy data gathering and aggregation in sensor networks[J].ACM Transactions on Sensor Networks (TOSN),2010,7(1):12-37 |
No related articles found! |
|