Computer Science ›› 2016, Vol. 43 ›› Issue (1): 178-180.doi: 10.11896/j.issn.1002-137X.2016.01.040
Previous Articles Next Articles
NIU Wen-sheng, LI Ya-hui and GUO Peng
[1] Mark C C.A Discussion of a Modular Unmanned Demonstration Air Vehicle:A GARD CP2600[R].2000 [2] John A T.The Air Force is Pursuing Uninhabited Combat Air Vehicles in a Big Way[J].Air Force Magazine,2001,84(8):64 [3] Jones M C A.Unmanned Aerial Vehicles (UAVS)- an Assessment of Historical Operations and Future Possibilities:AU/ACSC/0230D/97-03[R].1997 [4] Siddiqui M S,Seon V C.Security Issues in Wireless Mesh Networks[C]∥IEEE International Conference on Multimedia and Ubiquitous Engineering (MUEy07).2007 [5] Zhang W,Wang Z,Das S K,et al.Security Issues in Wireless Mesh Networks[M]∥Wireless Mesh Networks:Architectures and protocols.New York:Springer,2008 [6] IEEE Standard for Local and Metropolitan Area Networks Part 16:Air Interface for Fixed Broadband Wireless Access Systems:IEEE Std 802.16-2004[S].2004:1-857 [7] Shamir A.Identity-based cryptography and signature schemes[M]∥Advances in Cryptology(CRYPTO’84):Lecture Notes in Computer Science 196.Berlin:Springer-Verlag,1985:47-53 [8] Boneh D,Franklin M.Identity-based encryption from the Weil pairing[M]∥Advances in Cryptology(CRYPTO 2001):Lecture Notes in Computer Science.Berlin:Springer-Verlag,2001:213-229 [9] Ke Zeng.Pseudonymous PKI for ubiquitous computing[M]∥Public Key Infrastructure:Lecture Notes in Computer Science.Springer Berlin Heideleberg,2006:207-222 [10] Tu Jun-yang.Research on Synthesis Data Links of Multi-UAV Cooperative Combat[C]∥China Unmanned Aircraft Systems Summit 2008.Beijing,2008:735-739 [11] Wang Gang,Wen Tao,Guo Quan,et al.An Efficient and Secure Group Key Management Scheme in Mobile Ad Hoc Networks[J].Journal of Computer Research and Development,2010,47(5):911-920 [12] Hu Liang,Liu Zhe-li,Sun Tao,et al.Survey of Security on Identity-Based Cryptography[J].Journal of Computer Research and Development,2009,46(9):1537-1548 [13] Shi Rong-hua,Yuan Qian.A secure hierarchical key manage-ment scheme in mobile ad hoc networks[J].Journal of Central South University (Science and Technology),2010,41(1):201-206 [14] Lauter K.The advantages of elliptic curve cryptography forwireless security[J].IEEE Wireless Communications,2004,11(1):62-67 |
No related articles found! |
|