参考文献
[1]DAS M L.Two-factor User Authentication in Wireless Sensor Networks[J].IEEE Transactions on Wireless Communications,2009,8(3):1086-1090.
[2]OPPLIGER R,HAUSER R,BASIN D.SSL/TLS Session-aware User Authentication[J].Computer,2008,41(3):59-65.
[3]王帅,常朝稳,魏彦芬.基于云计算的USB Key身份认证方案[J].计算机应用研究,2014,31(7):2130-2134.
[4]谢璇,王瑞刚,杨小宝,等.一种SD卡用户身份认证方案的设计与实现[J].电子科技,2015,28(6):57-60.
[5]PIRZADA A A,MCDONALD C.A Review of Secure Routing Protocols for Ad Hoc Mobile Wireless Networks[C]//Proceedings of the 2nd Workshop on the Internet,Telecommunications and Signal Processing.Berlin,Germany:Springer,2003:57-80.
[6]PIRZADA A,MCDONALD C.Kerberos Assisted Authentication in Mobile Ad-Hoc Networks[C]//Proceedings of the 27th Australasian Computer Science Conference.Dunedin,New Zealand:[s.n.],2004:41-46.
[7]BHAKTI M A C,ABDULLAH A,JUNG L T.EAP-based Authentication for Ad Hoc Network[C]//Proceedings of Seminar Nasional Aplikasi Teknologi Informasi Conference.Yogyakarta,Indonesia:[s.n.],2007:133-137.
[8]ABOUDAGGA N,QUISQUATER J J,ELTOWEISSY M.Group Authentication Protocol for Mobile Networks[C]//Proceedings of the 3rd IEEE International Conference on Wireless and Mobile Computing,Networking and Communications.Washington D.C.,USA:IEEE Press,2007:28.
[9]HARN L.Group Authentication[J].IEEE Transactions on Computers,2013,62(9):1893-1989.
[10]SHAMIR A.How to Share a Secret[J].Communications of the ACM,1979,22(11):612-613.
[11]周晓斌,许勇,张凌.一种开放式PKI身份认证模型的研究[J].国防科技大学学报,2013,35(1):169-174.
[12]YANG H,JIAO L,OLESHCHUK V A.A General Framework for Group Authentication and Key Exchange Protocols[M].Berlin,Germany:Springer,2014.
[13]FENG W,CHANG C C,CHOU Y C.Group Authentication and Group Key Distribution for Ad Hoc Networks[J].International Journal of Network Security,2015,17(2):199-207.
[14]GUO C,ZHUANG R,YUAN L,et al.A Group Authentication Scheme Supporting Cheating Detection and Identification[C]//Proceedings of the 9th International Conference on Frontier of Computer Science and Technology.Washington D.C.,USA:IEEE Press,2015:110-114.
[15]CABALLERO-GIL P,HERNNDEZ-GOYA C.Self-organized Authentication in Mobile Ad-Hoc Networks[J].Journal of Communications and Networks,2009,11(5):509-517.
[16]CAPKUN S,BUTTYAN L,HUBAUX J P.Self-organized Public-key Management for Mobile Ad Hoc Networks[J].IEEE Transactions on Mobile Computing,2003,2(1):52-64.
[17]MIAO F Y,XIONG Y,WANG X F.Randomized Component and Its Application to (t,m,n)-group Oriented Secret Sharing[J].IEEE Transactions on Information Forensics and Security,2015,10(5):889-899.
编辑金胡考 |