参考文献
[1] 孙利民, 李建中, 陈 渝, 等. 无线传感器网络[M]. 北京:清华大学出版社, 2005.
[2] Campbell C E A, Loo K K J, Gemikonakli O, et al. Multi- channel Distributed Coordinated Function over Single Radio in Wireless Sensor Networks[J]. Sensors, 2011, 11(1): 964-991.
[3] Ye Wei, Heidemann J, Estrin D. An Energy-efficient MAC Protocol for Wireless Sensor Networks[C]//Proc. of the 21st Annual Joint Conference of the IEEE Computer and Communications Societies. New York, USA: IEEE Press, 2002: 1567-1576.
[4] Song Wenzhan, Huang Renjie, Shirazi B, et al. TreeMAC: Localized TDMA MAC Protocol for Real-time High-data-rate Sensor Networks[J]. Pervasive and Mobile Computing, 2009, 5(6): 750-765.
[5] Lin Chih-Kuang, Zadorozhny V I, Krishnamurthy P V, et al. A Distributed and Scalable Time Slot Allocation Protocol for Wireless Sensor Networks[J]. IEEE Transactions on Mobile Computing, 2011, 10(4): 505-518.
[6] Zhou Guang, Huang Chengdu, Yan Ting, et al. MMSN: Multi-frequency Media Access Control for Wireless Sensor Networks[C]//Proc. of IEEE INFOCOM’06. [S. l.]: IEEE Press, 2006: 1-13. (下转第117页)
参考文献
[1] Rivest R L, Shamir A, Tauman Y. How to Leak a Secret[C]// Proc. of the 7th International Conference on the Theory and Application of Cryptology and Information Security. London, UK: [s. n.], 2001.
[2] Shamir A. Identity-based Cryptosystems and Signature Sch- emes[C]//Proc. of CRYPTO’84. Santa Barbara, USA: [s. n.], 1985.
[3] Boneh D, Franklin M. Identity Based Encryption from the Weil Pairing[C]//Proc. of CRYPTO’01. Santa Barbara, USA: [s. n.], 2001.
[4] Cocks C. An Identity Based Encryption Scheme Based on Quadratic Residues[C]//Proc. of the 8th IMA International Conference on Cryptography and Coding Cryptography and Coding. Berlin, Germany: Springer-Verlag, 2001.
[5] 柴震川, 董晓蕾, 曹珍富. 利用二次剩余构造基于身份的数字签名方案[J]. 中国科学F辑: 信息科学, 2009, 39(2): 199-204.
[6] Zhang Fangguo, Kim K. ID-based Blind Signature and Ring Signature from Pairings[C]//Proc. of ASIACRYPT’02. Berlin, Germany: Springer-Verlag, 2002.
[7] Lin Chih-Yin, Wu Tzong-Chen. An Identity-based Ring Signature Scheme from Bilinear Pairings[EB/OL]. (2003- 08-10). http://eprint.iacr.org/2003/117.
[8] Awasthi A, Lai S. ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings[EB/OL]. (2004- 04-21). http://eprint.iacr.org/2004/184.
[9] Javier H, Saez G. New Identity-based Ring Signature Schemes[C]//Proc. of ICICS’04. Berlin, Germany: Springer- Verlag.
[10] Chow S S M, Yiu S, Hui L C K. Efficient Identity Based Ring Signature[C]//Proc. of ACNS’05. Berlin, Germany: Springer-Verlag, 2005.
[11] Nguyen L. Accumulators from Bilinear Pairings and App- lications to ID-based Ring Signatures and Group Membership Revocation[C]//Proc. of CT-RSA’05. Berlin, Germany: Springer-Verlag, 2005.
[12] Hu Xiong, Qin Zhiguang, Li Fagen. Identity-based Ring Signature Scheme Based on Quadratic Residues[J]. High Technology Letters, 2009, 15(1): 94-100.
[13] Willliams H C. An M3 Public-key Encryption Scheme[C]// Proc. of Crypto’85. Berlin, Germany: Springer-Verlag, 1985.
[14] Damg I B, Frandsen G S. Efficient Algorithms for GCD and Cubic Residuosity in the Ring of Eisenstein Integers[J]. Journal of Symbolic Computation, 2005, 39(6): 643-652.
[15] 柯 召, 孙 琦. 数论讲义[M]. 2版. 北京: 高等教育出版社, 2001.
[16] Pointcheval D, Stern J. Security Arguments for Digital Signatures and Blind Signatures[J]. Journal of Cryptology, 2000, 13(3): 361-369.
[17] Herranz J, Saez G. Forking Lemmas for Ring Signature Schemes[C]//Proc. of INDOCRYPT’03. Berlin, Germany: Springer-Verlag, 2003.
[18] Barreto S L M, Lynn B, Scott M. On the Selection of Pairing-friendly Groups[C]//Proc. of SAC’04. Berlin, Germany: Springer-Verlag, 2004.
编辑 金胡考 |