[1] |
SU X , HUI B , CHANG K H . Multi-hop clock synchronization based on robust reference node selection for ship ad-hoc network[J]. Journal of Communications & Networks, 2016,18(1): 65-74.
|
[2] |
PAPI F , TARCIH D , VESPE M ,et al. Radiolocation and tracking of automatic identification system signals for maritime situational awareness[J]. Radar Sonar & Navigation Iet, 2015,9(5): 568-580.
|
[3] |
ZHOU M , VEEN A J V D . Blind beamforming techniques for automatic identification system using GSVD and tracking[C]// IEEE International Conference on Acoustics,Speech and Signal Processing. 2014: 3012-3016.
|
[4] |
YANG J , CHENG Y , CHEN L . The detection probability modeling and application study of satellite-based AIS system[C]// IEEE Information Technology and Artificial Intelligence Conference. 2015: 28-33.
|
[5] |
ZHOU M T , HOANG V D , HARADA H ,et al. TRITON:high-speed maritime wireless mesh network[J]. IEEE Wireless Communications, 2013,20(5): 134-142.
|
[6] |
YANG T , ZHENG Z , LIANG H ,et al. Green energy and content-aware data transmissions in maritime wireless communication networks[J]. IEEE Transactions on Intelligent Transportation Systems, 2015,16(2): 751-762.
|
[7] |
YANG T , LIANG H , CHENG N ,et al. Efficient scheduling for video transmissions in maritime wireless communication networks[J]. IEEE Transactions on Vehicular Technology, 2015,64(9): 4215-4229.
|
[8] |
HUA C , SHEN Z , LU J . High-efficiency sea-water monopole antenna for maritime wireless communications[J]. IEEE Transactions on Antennas & Propagation, 2014,62(12): 5968-5973.
|
[9] |
LANDY J C , KOMAROV A S , BARBER D G ,et al. Numerical and experimental evaluation of terrestrial LiDAR for parameterizing centimeter-scale sea ice surface roughness[J]. IEEE Transactions on Geoscience and Remote Sensing, 2015,53(9): 4887-4898.
|
[10] |
吴黎兵, 谢永, 张宇波 . 面向车联网高效安全的消息认证方案[J]. 通信学报, 2016,37(11): 1-10.
|
|
WU L B , XIE Y , ZHANG Y B . Efficient and secure message authentication scheme for VANET[J]. Journal on Communications, 2016,37(11): 1-10.
|
[11] |
KIM Y B , KIM J H , WANG Y P ,et al. Application scenarios of nautical ad-hoc network for maritime communications[C]// IEEE Oceans. 2009: 1-4.
|
[12] |
MAMBO M , USUDA K , OKAMOTO E . Proxy signatures:delegation of the power to sign messages[J]. IEICE Transactions on Fundamentals of Electronics,Communications and Computer Sciences, 1996,79(9): 1338-1354.
|
[13] |
ZHANG F , KIM K . Efficient ID-based blind signature and proxy signature from bilinear pairings[C]// ACISP’2003,LNCS 2727. 2003: 312-323.
|
[14] |
QIAN H , CAO Z , XUE Q . Efficient pairing-based threshold proxy signature scheme with known signers[M]. IOS Press, 2005.
|
[15] |
WU W , MU Y , SUSLIO W ,et al. Identity-based proxy signature from pairings[C]// International Conference on Autonomic and Trusted Computing. 2007: 22-31.
|
[16] |
LIU J , HUANG S . Identity-based threshold proxy signature from bilinear pairings[M]. IOS Press, 2010.
|
[17] |
YANG T , XIONG H , HU J ,et al. A traceable certificateless threshold proxy signature scheme from bilinear pairings[C]// Asia-Pacific Web Conference on Web Technologies and Applications. 2011: 376-381.
|
[18] |
于义科, 郑雪峰 . 标准模型下基于身份的高效动态门限代理签名方案[J]. 通信学报, 2011,32(8): 55-63.
|
|
YU Y K , ZHENG X F . ID-based efficient and proactive threshold proxy signature in the standard model[J]. Journal on Communications, 2011,32(8): 55-63.
|
[19] |
MENG X , LI Y . A novel verifiable threshold signature scheme based on bilinear pairing in mobile ad hoc network[C]// International Conference on Information and Automation. 2012: 361-366.
|
[20] |
QIN H , ZHU X , DAI Y . Provably secure identity-based threshold signature on access structure[M]. 2014.
|
[21] |
SHAO J , LIN X , LU R ,et al. A threshold anonymous authentication protocol for VANETs[J]. IEEE Transactions on Vehicular Technology, 2016,65(3): 1711-1720.
|
[22] |
YEH L Y , LIN Y C . A proxy-based authentication and billing scheme with incentive-aware multihop forwarding for vehicular networks[J]. IEEE Transactions on Intelligent Transportation Systems, 2014,15(4): 1607-1621.
|
[23] |
SHUM K , WEI V K . A strong proxy signature scheme with proxy signer privacy protection[C]// Eleventh IEEE International Workshops on Enabling Technologies:Infrastructure for Collaborative Enterprises. 2002: 55-56.
|
[24] |
KENNEY J B . Dedicated short-range communications (DSRC) standards in the united states[J]. Proceedings of the IEEE, 2011,99(7): 1162-1182.
|
[25] |
HUI B , JEON K H , CHANG K H ,et al. Design of radio transmission technologies for VHF band ship ad-hoc network[C]// IEEE International Conference on ICT Convergence. 2011: 626-629.
|
[26] |
牛淑芬, 牛灵, 王彩芬 ,等. 标准模型下可证明安全的无证书广义签密[J]. 通信学报, 2017,38(4): 35-45.
|
|
NIU S F , NIU L , WANG C F ,et al. Certificateless generalized signcryption scheme in the standard model[J]. Journal on Communications, 2017,38(4): 35-45.
|
[27] |
张华, 温巧燕, 金正平 . 可证明安全算法与协议[M]. 北京: 科学出版社, 2012.
|
|
ZHANG H , WEN Q Y , JIN Z P . Provable security algorithm and protocol[M]. Beijing: Science PressPress, 2012.
|
[28] |
冯登国 . 可证明安全性理论与方法研究[J]. 软件学报, 2005,16(10): 1743-1756.
|
|
FENG D G . Research on theory and approach of provable security[J]. Journal of Software, 2005,16(10): 1743-1756.
|