Computer Science ›› 2013, Vol. 40 ›› Issue (6): 124-127.
Previous Articles Next Articles
SUN Ling and TIAN Yuan
[1] 徐光祐,史元春,谢伟凯.普适计算[J].计算机学报,2003,26(9):1042-1050 [2] Park J S,Sadi M G,Kim D S,et al.A Novel Pairwise Key Predistribution Scheme for Ubiquitous Sensor Network[C]∥MADNES 2005.Singapore,2005:2-13 [3] Kausar F,Hussain S,Park J H,et al.A Key DistributionScheme Preventing Collusion Attacks in Ubiquitous Heterogeneous Sensor Networks[C]∥IFIP International Federation for Information Processing 2007.Taipei,Taiwan,2007:745-757 [4] Ge H.An Efficient Key Management Scheme for Pervasive computing[C]∥IEEE International Conference on Multimedia.Irvine,USA,2005:657-661 [5] Moon J S,Park J H,Lee D G.Authentication and ID-Based Key Management Protocol in Pervasive environment[J].Wireless Personal Communications,2009,50(3):221-233 [6] Shamir A.Identity Based Cryptosystems and signature schemes[C]∥Proc.CRYPTO’84.New York,USA,1984:47-53 [7] Sun H,Zheng X F,Deng Z Q.An Identity-based and Threshold Key Management Scheme for Ad hoc Networks[C]∥IEEE International Conference on Networks Security Wireless Communications and Trusted Computing.Wuhan,2009:520-523 [8] Koblitz P,Menezes P,Vanstone S.The state of elliptic curvecryptography[J].Designs,Codes and Cryptography,2000,9:173-193 [9] Barreto P,Kim H,Lynn B,et al.Efficient algorithms for pairing-based cryphosystems[C]∥CRYPTO2002.California,USA,2002:354-368 |
No related articles found! |
|