[1] |
沈传年 . 边缘计算安全与隐私保护研究进展[J]. 网络安全与数据治理, 2022,41(8): 41-48.
|
|
SHEN C N . Research progress of edge computing security and privacy protection[J]. Network Security and Data Governance, 2022,41(8): 41-48.
|
[2] |
LIU L , WANG Q , LI B Q . A system architecture for intelligent agriculture based on edge computing[J]. International Journal of Computer Applications in Technology, 2020,64(2): 126-132.
|
[3] |
YANG C , HUANG Q , LI Z ,et al. Big data and cloud computing:innovation opportunities and challenges[J]. International Journal of Digital Earth, 2017,10(1): 13-53.
|
[4] |
WANG T , QIU L , SANGAIAH A K ,et al. Edge-computing-based trustworthy data collection model in the internet of things[J]. IEEE Internet of Things Journal, 2020,7(5): 4218-4227.
|
[5] |
吴卫 . 边缘计算环境下物联网身份认证与隐私保护技术研究[D]. 西安:西安电子科技大学, 2019.
|
|
WU W . Research on IoT identity authentication and privacy protection technology in edge computing environment[D]. Xi’an:Xidian University, 2019.
|
[6] |
YU Y . Mobile edge computing towards 5G:vision,recent progress,and open challenges[J]. China Communications, 2016,13: 89-99.
|
[7] |
YANG L , LIU J . Cross domain authentication based on blockchain for mobile terminals in edge computing environment[C]// 2021 16th International Conference on Intelligent Systems and Knowledge Engineering (ISKE). 2021: 525-529.
|
[8] |
马立川, 裴庆祺, 肖慧子 . 万物互联背景下的边缘计算安全需求与挑战[J]. 中兴通讯技术, 2019,25(3): 37-42.
|
|
MA L C , PEI Q Q , XIAO H Z . Security requirements and challenges of edge computing in the context of the internet of everything[J]. ZTE Communication Technology, 2019,25(3): 37-42.
|
[9] |
ISLAM A , DEBNATH A , GHOSE M ,et al. A survey on task offloading in multi-access edge computing[J]. Journal of Systems Architecture, 2021,118:102225.
|
[10] |
AHMED E , REHMANI M H . Mobile edge computing:opportunities,solutions,and challenges[J]. Future Generation Computer Systems, 2017,70: 59-63.
|
[11] |
WANG X , GAO F , ZHANG J ,et al. Cross-domain authentication mechanism for power terminals based on blockchain and credibility evaluation[C]// 2020 5th International Conference on Computer and Communication Systems (ICCCS). 2020: 936-940.
|
[12] |
FAN K , PAN Q , WANG J ,et al. Cross-domain based data sharing scheme in cooperative edge computing[C]// 2018 IEEE International Conference on Edge Computing (EDGE). 2018: 87-92.
|
[13] |
CHEN C L , CHIANG M L , HSIEH H C ,et al. A lightweight mutual authentication with wearable device in location-based mobile edge computing[J]. Wireless Personal Communications, 2020,113: 575-598.
|
[14] |
SUN H , TAN Y , LI C ,et al. An edge-cloud collaborative cross-domain identity-based authentication protocol with privacy protection[J]. Chinese Journal of Electronics, 2022,31(4): 721-731.
|
[15] |
LYU P , WANG Y , WANG Y Z ,et al. A highly reliable cross-domain identity authentication protocol based on blockchain in edge computing environment[C]// 2022 IEEE 25th International Conference on Computer Supported Cooperative Work in Design(CSCWD). 2022: 1040-1046.
|
[16] |
张金花, 李晓伟, 曾新 ,等. 边缘计算环境下基于区块链的跨域认证与密钥协商协议[J]. 信息安全学报, 2021,6(1): 54-61.
|
|
ZHANG J H , LI X W , ZENG X ,et al. Cross domain authentication and key agreement protocol based on blockchain in edge computing environment[J]. Journal of Information Security, 2021,6(1): 54-61.
|
[17] |
DONG S , YANG H , YUAN J ,et al. Blockchain-based cross-domain authentication strategy for trusted access to mobile devices in the IoT[C]// 2020 International Wireless Communications and Mobile Computing (IWCMC). 2020: 1610-1612.
|
[18] |
WANG W , HU N , LIU X . BlockCAM:a blockchain-based crossdomain authentication model[C]// 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC). 2018: 896-901.
|
[19] |
赖建昌, 黄欣沂, 何德彪 ,等. 国密 SM9 数字签名和密钥封装算法的安全性分析[J]. 中国科学:信息科学, 2021,51(11): 1900-1913.
|
|
LAI J C , HUANG X Y , HE D B ,et al. Security analysis of digital signature and key encapsulation algorithm for state secret SM9[J]. Chinese Science:Information Science, 2021,51(11): 1900-1913.
|
[20] |
殷明 . 基于标识的密码算法 SM9 研究综述[J]. 信息技术与信息化, 2020(5): 88-93.
|
|
YIN M . Overview of research on identity based cryptography algorithm SM9[J]. Information Technology and Informatization, 2020(5): 88-93.
|
[21] |
丁洁, 林志阳, 沈荻帆 . 浅谈无可信第三方的身份认证协议[J]. 科技创新与应用, 2016(10): 57-58.
|
|
DING J , LIN Z Y , SHEN D F . On the identity authentication protocol without trusted third parties[J]. Technological Innovation and Application, 2016 (10): 57-58.
|
[22] |
LU Y , XU G , LI L ,et al. Robust privacy-preserving mutual authenticated key agreement scheme in roaming service for global mobility networks[J]. IEEE Systems Journal, 2019,13(2): 1454-1465.
|
[23] |
MA M , HE D , WANG H ,et al. An efficient and provably secure authenticated key agreement protocol for fog-based vehicular ad-hoc networks[J]. IEEE Internet of Things Journal, 2019,6(5): 8065-8075.
|