参考文献
[1]Li Shancang,Xu Lida,Zhao Shanshan.The Internet of Things:A Survey[J].Information Systems Frontiers,2014,17(2):243-259.
[2]Daidone R,Dini G.A Performance Evaluation Method for WSNs Security[C]//Proceedings of 2014 IEEE Symposium on Computers and Communication.Washington D.C.,USA:IEEE Press,2014:1-6.
[3]林春立,崔杰.WSN中自适应多路径安全路由协议[J].计算机工程,2016,42(6):144-150.
[4]Li Fagen,Pan Xiong.Practical Secure Communication for Integrating Wireless Sensor Networks into the Internet of Things[J].IEEE Sensors Journal,2013,13(10):3677-3684.
[5]Zheng Yuliang.Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature)+ Cost (Encrypttion)[C]//Proceedings of Advances in Cryptology’97.Berlin,Germany:Springer-Verlag,1997:165-179.
[6]Sun Yinxia,Li Hui.Efficient Signcryption Between TPKC and IDPKC and Its Multi-receiver Construc-tion[J].Science China(Information Sciences),2010,53(3):557-566.
[7]Chung K.An Efficient Signcryption Scheme with Key Privacy[C]//Proceedings of European Conference on Public Key Infrastructure:Theory and Practice.Berlin,Germany:Springer-Verlag,2007:78-93.
[8]Vivek S S,Selvi S S D,Kowsalya S S,et al.PKI Based Signcryption Without Pairing:An Efficient Scheme with Tight Security Reduction[J].Journal of Wireless Mobile Networks,Ubiquitous Computing,and Dependable Applications,2012,3(4):72-84.
[9]Shamir A.Identity-based Cryptosystems and Signature Schemes[C]//Proceedings of Advances in Cryptology.Berlin,Germany:Springer-Verlag,1985:47-53.
[10]An J H,Dodis Y,Rabin T.On the Security of Joint Signature and Encryption[C]//Proceedings of Advance in Cryptography-Eurocryp’02.Berlin,Germany:Springer-Verlag,2002:83-107.
[11]Huang Qiong,Wong D S,Yang Guomin.Heterogeneous Signcryption with Key Privacy[J].Computer Journal,2011,54(4):525-536.
[12]Li F G,Zhang Hui,Takagi T.Efficient Signcryption for Heterogeneous Systems[J].IEEE Systems Journal,2013,7(3):420-429.
[13]张玉磊,张灵刚,张永洁,等.匿名CLPKC-TPKI异构签密方案[J].电子学报,2016,44(10):2432-2439.
[14]张玉磊,李臣意,周冬瑞,等.高效的可撤销无证书签名方案[J].计算机工程,2015,41(7):157-162.
[15]Al-Riyami S S,Paterson K G.Certificateless Public Key Cryptography[C]//Proceedings of International Con-ference on the Theory and Application of Cryptology and Information Security.Berlin,Germany:Springer-Verlag,2003:452-473.
[16]周彦伟,杨波,张文政.可证安全的高效无证书广义签密方案[J].计算机学报,2016,39(3):543-551.
[17]Barbosa M,Farshim P.Certificateless Signcryption[C]//Proceedings of ACM Symposium on Information,Computer and Communications Security.New York,USA:ACM Press,2008:369-372.
[18]Pointcheval D,Stern J.Security Arguments for Digital Dignatures and Blind Signatures[J].Journal of Cryptology,2000,13(3):361-396.
[19]Klugah-Brown B,Dzisoo A M,Addobea A A.Heter-ogeneous Identity-based to Certificateless Online/Offline Signcryption[J].International Journal of Innovative Science,Engineering & Technology,2015,12(12):472-484.
编辑刘冰 |