[1] |
WEINFURTHER J M , PATON E R , CAUAUSHI A ,et al. Vehicle network communication protection[J]. Ford Global Technologies,LLC, 2018,2(16): 1-10.
|
[2] |
吴海云 . 面向车联网的群密钥管理方案的研究[D]. 合肥:安徽大学, 2017.
|
|
WU H Y . Research on group key management scheme for vehicle networking[D]. Anhui University, 2017.
|
[3] |
MAHMOOD Z , NING H . A Polynomial Subset-Based Efficient Multi-Party Key Management System for Lightweight Device Net-works[J]. Sensors, 2017,17(4): 670-696.
|
[4] |
LAI C , LU R , ZHENG D ,et al. GLARM:group-based light weight authentication scheme for resource-constrained machine to machine communications[C]. Computer Networks, 2018(99): 66-816.
|
[5] |
魏楚元, 李陶深, 王高才 ,等. 基于代理的分布式大型动态组播密钥管理协议[J]. 计算机工程与应用, 2007,43(7): 155-59.
|
|
WEI C Y , LI T S WANG G C ,et al. Distributed large dynamic multicast key management protocol based on agent[J]. Computer Engineering and Applications, 2007,43(7): 155-159.
|
[6] |
周健, 孙丽艳, 陈红琳 ,等. 星内集群自组织网络自治群组密钥管理研究[J]. 小型微型计算机系统, 2018,39(05): 904-909.
|
|
ZHOU J , SYN L Y , CHEN H L ,et al. Key management of auton-omous group in intra-satellite cluster self-organizing net-work[J]. Mini-micro Systems, 2018,39(5): 904-909.
|
[7] |
HAITAO WANG , LIHUA SONG , GUOMING ZHANG ,et al. Timetable-aware opportunistic DTN routing for vehicular communications in battlefield environments[J]. Future Generation Computer Systems, 2018(83): 95-103.
|
[8] |
赵齐 . 车载自组织网络群组密钥管理机制研究[D]. 吉林:吉林大学, 2015.
|
|
ZHAO Q . Research on key management mechanism of vehicle self-organizing network group[D]. Jilin:Jilin University, 2015.
|
[9] |
高天寒, 李艳强 . 车载自组织网匿名接入认证机制研究综述[J]. 网络与信息安全学报, 2016,2(08): 10-16.
|
|
GAO T H , LI Y Q . A Review of research on anonymous access authentication mechanism of vehicle self-organizing network[J]. Chinese Journal of Network and Information Security, 2016,2(8): 10-16.
|
[10] |
李凤华 . 信息技术与网络空间安全发展趋势[J]. 网络与信息安全学报, 2015,1(1): 8-17.
|
|
LI F H . Trends in Information technology and cyberspace security[J]. Chinese Journal of Network and Information Security, 2015,1(1): 8-17.
|
[11] |
杜晓强, 鲍皖苏 . 基于成员隶属关系的组播密钥管理方案[J]. 计算机工程与应用, 2013,49(1): 101-106.
|
|
DU X Q , BAO Y S . Multicast key management scheme based on member membership[J]. Computer Engineering and Applications, 2013,49(1): 101-106.
|
[12] |
SUTRALA DAS N KUMAR . On the design of secure user authenticated key management scheme for multi gate way-based wireless sensor networks using ECC[J]. International Journal of Communication Systems, 2018
|
[13] |
马铭鑫, 史国振, 王亚琼 ,等. 适用于分布式系统的多级安全访问控制策略[J]. 网络与信息安全学报, 2017,3(8): 32-38.
|
|
MA M X , SHI G Z , WANG Y Q ,et al. Multi-level secure access control strategy for distributed systems[J]. Chinese Journal of Network and Information Security, 2017,3(8): 28-34.
|
[14] |
高宝阳, 潘进, 康连瑞 ,等. 一种基于等级树模型的群组密钥管理方案[J]. 计算机与现代化, 2014,2(8): 34-37.
|
|
GAO B Y , PAN J , KANG L R ,et al. A group key management scheme based on hierarchical tree model[J]. Computer and Modernization, 2014 2(8): 34-37.
|
[15] |
李德全, 张习勇, 张婷婷 ,等. 具有私钥自愈能力的 DTN密钥管理方案[J]. 网络与信息安全报, 2017,3(4): 26-31.
|
|
LI D Q , ZHANG X T , ZHANG T T . DTN key management scheme with private key self-healing capability[J]. Chinese Journal of Network and Information Security, 2017,3(4): 26-31.
|
[16] |
尹建东 . 移动自组网中无证书可认证群组密钥管理方案研究[D]. 北京:北京理工大学, 2016.
|
|
YIN J D . Research on certificate-free certifiable group key management scheme in mobile ad hoc networks[D]. Beijing Institute of Technology, 2016.
|
[17] |
ERMIS O , BAHTIYAR? , ANARIM E ,et al. A secure and efficient group key agreement approach for Mobile ad hoc networks[J]. Ad Hoc Networks,Volume, 2017(67): 24-39.
|
[18] |
陈志广, 范晓琴 . 一种基 LKH 的高效的组播密钥管理方案[J]. 电脑知识与技术, 2011,7(25): 6088-6090+6107.
|
|
CHEN Z G , FAN X Q ,et al. An efficient multicast key management scheme based on LKH[J]. Computer Knowledge and Technology, 2011,7(25): 6088-6090.
|
[19] |
柯钢 . 一种高效的无线网络组密钥管理方案[J]. 西南师范大学学报(自然科学版), 2017,42(01): 47-53.
|
|
KE G . An efficient key management scheme for wireless network groups[J]. Journal of Southwest China Normal University (Natural Science), 2017,42(1): 47-53.
|
[20] |
WANG Q . A security and privacy review of VANET[J]. IEEE Transactions on Intelligent Transportation Systems, 2015,16(6): 2985-2996.
|
[21] |
POTTEIGER L , et al . Vulnerability of transportation networks to traffic-signal tampering[C]// International Conference on Cyber-Physical Systems. IEEE Press, 2016:16.
|
[22] |
毛传武, 程阳, 余文明 ,等. 动态实时身份认证的方法研究[J]. 网络与信息安全学报, 2016,2(3): 76-85.
|
|
MAO C W , CHENG Y , YU W M ,et al. Research on dynamic real-time identity authentication method[J]. Journal of Network and Information Security, 2016,2(3): 76-85.
|
[23] |
王良民, 李婷婷 . 基于车辆身份的车联网结构与安全[J]. 网络与信息安全学报, 2016,2(2): 41-54.
|
|
WANG L M , LI T T . Structure and security of vehicle network based on vehicle identity[J]. Chinese Journal of Network and Information Security, 2016,2(2): 41-54.
|