Computer Science ›› 2015, Vol. 42 ›› Issue (3): 111-116.doi: 10.11896/j.issn.1002-137X.2015.03.023
Previous Articles Next Articles
CHEN Shou-guo, FU An-min and QIN Ning-yuan
[1] 姜奇,马建峰,李光松,等.基于WAPI的WLAN 与3G网络安全融合[J].计算机学报,2010,33(9):1675-1685 [2] Prabhavathi P,Nithyanandan L.Network selection in wireless heterogeneous networks[C]∥Proceedings of 2013 International Conference on Communications and Signal Processing.Melmaruvathur,2013:357-361 [3] He Dao-jing,Chen Chun,Bu Jia-jun,et al.Security and Efficiency in Roaming Services for Wireless Networks:Challenges,Approaches,and Prospects[J].IEEE Communications Magazine,2013,51(2):142-150 [4] 傅建庆.面向3G_WLAN互联网络的安全协议研究[D].杭州:浙江大学,2010 [5] Rainer S,Christoph R.On the Security of the Non-Repudiation of Forwarding Service[C]∥Proceedings of 2012 International Conference on Trust,Privacy and Security in Digital Business.Vienna,Austria,2012:167-178 [6] Wu Wei,Zhou Jian-ying,Xiang Yan,et al.How to achieve non-repudiation of origin with privacy protection in cloud computing[J].Journal of Computer and System Sciences,2013,79(8):1200-1213 [7] Xiao Zhi-feng,Xiao Yang,Du D.Non-repudiation in neighborhood area networks for smart grid[J].IEEE Communications Magazine,2013,51(1):18-26 [8] Im T,Lee H,Cho K,et al.Secure Mutual Authentication andFair Billing for Roaming Service in Wireless Mobile Networks[C]∥Proceedings of the Third International Conference on Convergence and Hybrid Information Technology.Busan,2008:466-471 [9] Zhu Hao-jin,Lin Xiao-dong,Shi Ming-hui,et al.PPAB:A Privacy-Preserving Authentication and Billing Architecture for Metropolitan Area Sharing Networks[J].IEEE Transactions on Vehicular Technology,2009,58(5):2529-2543 [10] Fu An-min,Zhang Yu-qing,Zhu Zhen-chao,et al.An efficienthandover authentication scheme with privacy preservation for IEEE 802.16m network[J].Computers & Security,2012,31(6):741-749 [11] BS ISO/IEC.13888-1/2 Information technology-Security tech-niques- Non-repudiation[S].Switzerland:The Standards Policy and Strategy Committee,2009 [12] Lamport L.Password authentication with insecure communication[J].Communications of the ACM,1981,24(11):770-772 [13] 瓮佳佳,张敏情,刘昀昊.基于几何方法的自更新Hash链构造方案[J].计算机应用,2010,30(12):3343-3345 [14] 陈孟奇,严新荣,张彬祥.改进的基于自更新哈希链的认证方案[J].信息安全与通信保密,2013(2):73-75 [15] AVISPA Team.European Community under the InformationSociety Technologies Program .http://www.avispa-project.org,2012 [16] The NS-3 Consortium.NS3 tutorial & ns-allinone-3.9.tar.bz2 .http://www.nsnam.org/release/ns-allinone-3.9.tar.bz2,2013 |
No related articles found! |
|