[1] |
陈铁明, 李伟, 蔡家楣 ,等. IBE-XKMS:一个基于 XML 的IBE密钥管理服务体系[J]. 电信科学, 2010,26(7): 22-31.
|
|
CHEN T M , LI W , CAI J M ,et al. IBE-XKMS:XML-based IBE key management service infrastructure[J]. Telecommunications Science, 2010,26(7): 22-31.
|
[2] |
SATHYADEVAN S , ACHUTHAN K , DOSS R ,et al. Protean authentication scheme–a time-bound dynamic KeyGen authentication technique for IoT edge nodes in outdoor deployments[J]. IEEE Access, 2019: 92419-92435.
|
[3] |
杨力, 马建峰, 朱建明 . 可信的匿名无线认证协议[J]. 通信学报, 2009,30(9): 29-35.
|
|
YANG L , MA J F , ZHU J M . Trusted and anonymous authentication scheme for wireless networks[J]. Journal on Communications, 2009,30(9): 29-35.
|
[4] |
谌双双, 陈泽茂, 王浩 . 基于 PKI 的通用无线认证协议研究[J]. 计算机科学, 2012,39(7): 74-77.
|
|
CHEN S S , CHEN Z M , WANG H . Research on general wireless authentication protocol based on PKI[J]. Computer Science, 2012,39(7): 74-77.
|
[5] |
周彦伟, 杨波, 夏喆 ,等. 抵抗泄露攻击的可撤销 IBE 机制[J]. 计算机学报, 2020: 1-28.
|
|
ZHOU Y W , YANG B , XIA Z ,et al. Revocable identity-based encryption scheme with leakage-resilience[J]. Chinese Journal of Computers, 2020: 1-28.
|
[6] |
鲁阳 . 物联网终端可信认证与自动接入技术研究与实现[D]. 南京:南京邮电大学, 2019.
|
|
LU Y . Research and implementation of terminal authentication and automatic access technology in IoT[D]. Nanjing:Nanjing University of Posts and Telecommunications, 2019.
|
[7] |
张鑫, 杨晓元, 朱率率 ,等. 物联网环境下移动节点可信接入认证协议[J]. 计算机应用, 2016,36(11): 3108-3112.
|
|
ZHANG X , YANG X Y , ZHU S S ,et al. Trusted access authentication protocol for mobile nodes in internet of things[J]. Journal of Computer Applications, 2016,36(11): 3108-3112.
|
[8] |
SHAMIR A , . Identity-based cryptosystems and signature schemes[C]// Proceedings of Annual International Cryptology CRYOTO 1984:Conference Advances in Cryptology. Berlin:Springer, 1984: 47-53.
|
[9] |
TANAKA H , . A realization scheme for the identity-based cryptosystem[C]// Proceedings of Conference on the Theory and Applications of Cryptographic Techniques,Advances in Cryptology-CRYPTO 1987. Berlin:Springer, 1987: 340-349.
|
[10] |
BONEH D , FRANKLIN M . Identity-based encryption from the weil pairing[C]// Proceedings of Annual International Cryptology Conference,Advances in Cryptology—CRYPTO 2001. Berlin:Springer, 2001: 213-229.
|
[11] |
COCKS C , . An identity based encryption scheme based on quadratic residues[C]// Proceedings of IMA International Conference on Cryptography and Coding,Cryptography and Coding 2001. Berlin:Springer, 2001: 360-363.
|