[1] Zhou Lidong, Hass Z J. Securing Ad Hoc Networks[J]. IEEE Networks Special Issue on Network Security, 1999, 13(6): 24-30.[2] Luo Haiyun, Zerfos P, Kong Jiejun, et al. Self-securing Ad hoc Wireless Networks[C]//Proc. of the 7th Symposium on Computers and Communications. Taormina, Italy: IEEE Press, 2002: 567-574.[3] 张玉臣, 王亚第, 马自堂, 等. Ad Hoc网络环境下分布式密钥管理[J]. 武汉大学学报: 理学版, 2009, 55(1): 85-88.[4] Shamir A. How to Share a Secret[J]. Communications of ACM, 1979, 22(11): 612-613.[5] Luo Haiyun, Lu Songwu. Ubiqutous and Robust Authentication Services for Ad hoc Wireless Network[R]. Los Angeles, USA: University of California, Tech. Rep.: TR-20030, 2000.[6] Kong Jiejun, Zerfos P, Luo Haiyun, et al. Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks[C]//Proc. of the 9th International Conference on Network Protocols. [S .l.]: IEEE Press, 2001.[7] Kong Jiejun, Zerfos P, Luo Haiyun, et al. Ubiquitous and Robust Access Control for Mobile Ad Hoc Networks[J]. ACM Transactions on Networking, 2004, 12(6): 1049- 1063.[8] Cheng Xiaofeng, Zhang Fangguo, Kim K. Limited Verifier Signature from Bilinear Pairings[C]//Proc. of the 9th Australasian Conference on Information Security and Privacy. Sydney, Australia: Springer-Verlag, 2004.[9] 王晓峰, 王尚平. 新的基于身份的广义指定验证者签名方案[J]. 电子学报, 2007, 35(8): 1432-1436.[10] 李顺东, 王道顺. 现代密码学: 理论、方法与研究前 沿[M]. 北京: 科学出版社, 2009.[11] 张韶华. 欧几里德算法及相关问题研究[D]. 济南: 山东大学, 2010. |