[1] |
潘爱民 . 创新物联网 OS 安全应对 IoT 风险[J]. 中国信息安全, 2020(2): 44-51.
|
|
PAN A M . Resisting IOT risk by the innovation of the IOT OS security[J]. China Information Security, 2020(2): 44-51.
|
[2] |
施巍松, 张星洲, 王一帆 ,等. 边缘计算:现状与展望[J]. 计算机研究与发展, 2019,56(1): 69-89.
|
|
SHI W S , ZHANG X Z , WANG Y F ,et al. Edge computing:state-of-the-art and future directions[J]. Journal of Computer Research and Development, 2019,56(1): 69-89.
|
[3] |
彭维平, 熊长可, 贺军义 ,等. 边缘计算场景下车联网身份隐私保护方案研究[J]. 小型微型计算机系统, 2020,41(11): 2399-2406.
|
|
PENG W P , XIONG C K , HE J Y ,et al. Research on the identity privacy protection scheme of internet of vehicles in edge computing scenario[J]. Journal of Chinese Computer Systems, 2020,41(11): 2399-2406.
|
[4] |
QIU H , QIU M , LU Z ,et al. An efficient key distribution system for data fusion in V2X heterogeneous networks[J]. Information Fusion, 2019,50: 212-220.
|
[5] |
RAYA M , HUBAUX J P . Securing vehicular ad hoc networks[J]. Journal of Computer Security, 2007,15(1): 39-68.
|
[6] |
SHEN J , ZHOU T Q , HE D B ,et al. Block design-based key agreement for group data sharing in cloud computing[J]. IEEE Transactions on Dependable and Secure Computing, 2017.
|
[7] |
SHEN J , ZHOU T Q , CHEN X F ,et al. Anonymous and traceable group data sharing in cloud computing[J]. IEEE Transactions on Information Forensics and Security, 2017,13(4): 912-925.
|
[8] |
周天祺, 杨惠杰, 沈剑 . 车联网中支持动态操作的密钥协商协议[J]. 密码学报, 2020,7(3): 375-388.
|
|
ZHOU T Q , YANG H J , SHEN J . Key agreement protocol with dynamic property for VANETs[J]. Journal of Cryptologic Research, 2020,7(3): 375-388.
|
[9] |
单莉 . 车联网中面向V2V安全即时通信的密钥分配方案设计[J]. 信息安全与通信保密, 2020(10): 107-113.
|
|
SHAN L . Key distribution program design for V2V instant secure messaging in Internet of Vehicles[J]. Information Security and Communications Privacy, 2020(10): 107-113.
|
[10] |
徐堂炜, 张海璐, 刘楚环 ,等. 基于强化学习的低时延车联网群密钥分配管理技术[J]. 网络与信息安全学报, 2020,6(5): 119-125.
|
|
XU T W , ZHANG H L , LIU C H ,et al. Reinforcement learning based group key agreement scheme with reduced latency for VANET[J]. Chinese Journal of Network and Information Security, 2020,6(5): 119-125.
|
[11] |
WANG D , WANG P . Two birds with one stone:two-factor authentication with security beyond conventional bound[J]. IEEE Transactions on Dependable and Secure Computing, 2016,15(4): 708-722.
|
[12] |
王晨宇, 汪定, 王菲菲 ,等. 面向多网关的无线传感器网络多因素认证协议[J]. 计算机学报, 2020,43(4): 683-700.
|
|
WANG C Y , WANG D , WANG F F ,et al. Multi-factor user authentication scheme for multi-gateway wireless sensor networks[J]. Chinese Journal of Computers, 2020,43(4): 683-700.
|
[13] |
BONEH D , WATERS B . Constrained pseudorandom functions and their applications[C]// International Conference on the Theory and Application of Cryptology and Information Security. 2013: 280-300.
|
[14] |
GOLDREICH O , GOLDWASSER S , MICALI S . How to construct random functions[M]. Providing Sound Foundations for Cryptography:On the Work of Shafi Goldwasser and Silvio Micali. 2019: 241-264.
|
[15] |
GARG S , GENTRY C , HALEVI S . Candidate multilinear maps from ideal lattices[C]// Annual International Conference on the Theory and Applications of Cryptographic Techniques. 2013: 1-17.
|
[16] |
LI J , TANG X , WEI Z ,et al. Identity-based multi-recipient public key encryption scheme and its application in IoT[J]. Mobile Networks and Applications, 2019: 1-8.
|
[17] |
DUPONT R , ENGE A . Provably secure non-interactive key distribution based on pairings[J]. Discrete Applied Mathematics, 2006,154(2): 270-276.
|
[18] |
PATERSON K G , SRINIVASAN S . On the relations between non-interactive key distribution,identity-based encryption and trapdoor discrete log groups[J]. Designs,Codes and Cryptography, 2009,52(2): 219-241.
|