[1] Deng Zhian,Xu Yubin,Ma Lin.Indoor Positioning via Nonlinear Discriminative Feature Extraction in Wireless Local Area Network[J].Computer Communications,2012,35(6):738-747. [2] 张招亮,陈海明,黄庭培,等.无线传感器网络中一种抗无线局域网干扰的信道分配机制[J].计算机学报,35(3):504-517. [3] Guo Minghuang,Liaw H T,Chen J F,et al.Secure Authentication Mechanism for RFID Tag in WLAN Con-vergence 3G Networks[J].Security and Communica-tion Networks,2012,5(3):319-330. [4] 刘振华,周 颢,赵保华.无线局域网自适应安全管理框架及其应用[J].西安交通大学学报,2010,44(4):34-38. [5] 杨 力,马建峰,裴庆祺,等.直接匿名的无线网络可信接入认证方案[J].通信学报,2012,31(8):99-104. [6] Jiang Yixin,Lin Chuang,Yin Hao,et al.A Mutual Authentication and Privacy Mechanism for WLAN Security:Research Articles[J].Wireless Communications and Mobile Computing,2008,8(1):101-112. [7] Tseng Yuh-Min.USIM-based EAP-TLS Authentication Protocol for Wireless Local Area Networks[J].Computer Standards & Interfaces,2009,31(1):128-136. [8] 姜 奇,马建峰,李光松,等.基于WAPI的WLAN与3G网络安全融合[J].计算机学报,2010,33(9):1675-1685. [9] Kim M,Kim K.A New Identification Scheme Based on the Bilinear Diffie-Hellman Problem[C]//Proceedings of ACISP’02.Melbourne,Australia:Springer-Verlag,2002:362-378. [10] Zhang Zhengfeng,Xu Jin,Feng Dengguo.Attack on an Identification Scheme Based on Gap Diffie-Hellman Problem[EB/OL].[2013-12-11].http://eprint.iacr.org/2003/153.pdf. [11] 彭华熹.一种基于身份的多信任域认证模型[J].计算机学报,2006,29(8):1271-1281. [12] 朱 辉,李 晖,苏万力,等.基于身份的匿名无线认证方案[J].通信学报,2009,30(4):130-136. [13] Haddad W.Using Cryptographically Generated Addresses(CGA) to Secure HMIPv6 Protocol(HMIPv6 sec)[R].RFC 3972,2006. [14] Kandikattu R,Jacob L.A Secure IPv6-based Urban Wireless Mesh Network(SUMNv6)[J].Computer Communications,2008,31(15):3707-3718. [15] 高天寒,郭 楠,朱志良.节点证书与身份相结合的 HMIPv6 网络接入认证机制[J].软件学报,2012,23(9):2465-2480. [16] Boneh D,Franklin M.Identity-based Encryption from the Weil Pairing[C]//Proceedings of CRYPTO’01.Berlin,Germany:Springer,2001:213-229. [17] Cha J C,Cheon J H.An Identity-based Signature from Gap Diffie-Hellman Groups[C]//Proceedings of PKC’03.Miami,USA:[s.n.],2003:18-30. [18] Boneh D,Lynn B,Shacham H.Short Signatures from the Weil Pairing[C]//Proceedings of ASIACRYPT’01.Berlin,Germany:Springer,2001:514-532. [19] Smart N P.Identity-based Authenticated Key Agreement Protocol Based on Weil Pairing[J].Electronics Letters,2002,38(13):630-632. [20] Shim K.Efficient ID-based Authenticated Key Agreement Protocol Based on Weil Pairing[J].Electronics Letters,2003,39(8):653-654. [21] Chen L,Kudla C.Identity Based Authenticated Key Agreement Protocols from Pairings[C]//Proceedings of the 16th IEEE Computer Security Foundations Workshop.[S.l.]:IEEE Press,2003:219-233. |