Computer Science ›› 2013, Vol. 40 ›› Issue (11): 122-125.
Previous Articles Next Articles
ZHU Xiao-ling,LU Yang,ZHANG Ben-hong and HOU Zheng-feng
[1] 朱建明,马建峰.一种高效的具有用户匿名性的无线认证协议[J].通信学报,2004,25(6):12-18 [2] 彭华熹,冯登国.匿名无线认证协议的匿名性缺陷和改进[J].通信学报,2006,27(9):78-85 [3] 于爱民,初晓博,冯登国.基于可信芯片的终端平台匿名身份建立方法研究[J].计算机学报,2010,33(9):1703-1712 [4] 吴振强,周彦伟,乔子芮.一种可控可信的匿名通信方案[J].计算机学报,2010,33(9):1686-1702 [5] Boneh D,Boyen X,Shacham H.Short group signatures[C]∥Proceedings of Crypto’04.Springer Berlin Heidelberg,2004:41-55 [6] Sun Xiao-ting,Ho Pin-han,Shen Xue-min.GSIS:Secure vehicular communications with privacy preserving [J].IEEE Transactions on vehicular technology,2007,56(6):3442-3456 [7] 田子健,王继林,伍云霞.一个动态的可追踪匿名认证方案[J].电子与信息学报,2005,27(11):1737-1740 [8] 李梦东,杨义先.无可信第三方的离线电子现金匿名性控制[J].电子学报,2005,33(3):456-458 [9] Cao Tian-jie,Lin Dong-dai,Xue Rui.A randomized RSA-based partially blind signature scheme for electronic cash[J].Compu-ters & Security,2005,24(1):44-49 [10] 曹珍富,朱浩瑾,陆荣幸.可证安全的强壮门限部分盲签名[J].中国科学E辑信息科学,2005,5(12):1254-1265 [11] 冯涛,彭伟,马建峰.安全的无可信PKG的部分盲签名方案[J].通信学报,2010,31(1):12-18 [12] Housley R,Ford W,Polk W,et al.Internet X.509Public Key Infrastructure Certificate and CRL Profile[EB/OL].http://www.ietf.org/rfc/rfc2459.txt,2012-03 [13] Shamir A.How to share a secret[J].Communications of theACM,1989,22(11):612-613 |
No related articles found! |
|