[1] |
SUN Y , TRAPPE W , LIU K J R . A sKMClablemultiKMCst key management scheme for heterogeneous wireless networks[M]. IEEE Press, 2004.
|
[2] |
ZHOU W , XU Y , WANG G . Decentralized group key management for hierarchiKMCl access control using multilinear forms[J]. Concurrency & Computation Practice&Experience, 2016,28(3): 631-645.
|
[3] |
张志军, 郭渊博, 刘伟 ,等. 基于m叉树与DH协议的组密钥协商协议[J]. 计算机工程, 2010,36(1): 161-163.
|
|
ZHANG Z J , GUO Y B , LI W ,et al. Group key agreement protocol based on m-tree and DH protocol[J]. Computer Engineering, 2010,36(1): 161-163.
|
[4] |
YU S C , REN K , LOU W J . Attribute-based on-demand multicast group setup with membership anonymity[J]. Computer Networks, 2010,54(3): 377-386.
|
[5] |
HE D , CHEN C , CHAN S ,et al. Secure and efficient handover authentication based on bilinear pairing functions[J]. IEEE Transactions on Wireless Communications, 2012,11(1): 48-53.
|
[6] |
HE D,CHANS , GUIZANI M . Handover authentication for mobile networks:security and efficiency aspects[J]. IEEE Network, 2015,29(3): 96-103.
|
[7] |
NAKAMOTO S . Bitcoin:A peer-to-peer electronic cash system[J]. Consulted, 2008
|
[8] |
荆继武, 林璟锵, 冯登国 . PKI 技术[M]. 北京: 科学出版社, 2008:6.
|
|
JING J W , LIN J Q , FENG D G . PKI technology[M]. Beijing: Science PressPress, 2008:6.
|
[9] |
Bitcoin blockchain size[EB/OL]. .
|
[10] |
MERKLE R , . C,A digital signature based on a conventional en-cryption function[C]// Advances in CryptologyCRYPTO87. Springer, 1987 369-378.
|
[11] |
AITZHAN N.Z , SVETINOVIC D . ,Security and privacy in de-centralized energy trading through multi-signatures,blockchain and anonymous messaging streams[J]. IEEE Transactions on De-pendable and Secure Computing, 2016,99: 1-1.
|
[12] |
VARGA et al , . The Omnet++ discrete event simulation system[C]// Proceedings of the European simulation multiconference (ESM2001), 2001.
|
[13] |
SOMMER C , GERMAN R , DRESSLER F . Bidirectionally coupled network and road traffic simulation for improved ivc analysis[J]. Mobile Computing,IEEE Transactions on, 2011,10(1): 3-15.
|