[1] |
吕涛 . 卫星通信加密机及其接口[J]. 通信保密, 1989(2): 7-11.
|
|
LV T . Satellite communication encryption machine and its interface[J]. Communications Security, 1989(2): 7-11.
|
[2] |
向红权 . 一种卫星通信链路的加密技术实现研究[D]. 成都:电子科技大学, 2008.
|
|
XIANG H Q . Research on encryption technology implementation of a satellite communication link[D]. Chengdu:University of Electronic Science and Technology, 2008.
|
[3] |
邹宇聪 . 一种应用于微小卫星的通信数据加密技术[J]. 信息通信, 2016,(10): 223-24.
|
|
ZOU Y C . A communication data encryption technology applied to micro-satellite[J]. Information Communication, 2016,(10): 223-24.
|
[4] |
郑建宏, 周亮 . 椭圆曲线加密算法在卫星通信中的应用[J]. 信息通信, 2016(2): 209-210.
|
|
ZHENG J H , ZHOU L . Application of elliptic curve encryption algorithm in satellite communication[J]. Information Communication, 2016(2): 209-210.
|
[5] |
王宝成 . 基于DVB-RCS卫星通信系统的通信加密技术研究[D]. 北京:北京邮电大学, 2012.
|
|
WANG B C . Research on communication encryption technology based on dvb-rcs satellite communication system[D]. Beijing:Beijing University of Posts and Telecommunications, 2012.
|
[6] |
WANG B C , TANG C M , YANG Y X . The construction of GLV-friendly elliptic curves with fast point multiplication[J]. International Journal of Advancements in Computing Technology, 2012,4(4): 268-75.
|
[7] |
陈铁明, 葛亮, 蔡家楣 ,等. TinyTCSec:一种新的轻量级无线传感器网络链路加密协议[J]. 传感技术学报, 2011,24(2): 275-82.
|
|
CHEN T M , GE L , JIA M , MA S L . TinyTCSec:a new lightweight wireless sensor network link encryption protocol[J]. Journal of Sensor Technology, 2011,24(2): 275-82.
|
[8] |
马韶璞 . VSAT网络认证与数据加密的研究[D]. 天津:中国民航大学, 2015.
|
|
MA S P . Research on VSAT network authentication and data encryption[M]. Tianjin: Civil Aviation University of China, 2015.
|
[9] |
MA L . WNN-based prediction of security situation awareness for the civil aviation network[J]. Journal of Intelligent Systems, 2015,24(1): 55-67.
|
[10] |
高利军 . 无线射频识别系统安全认证协议研究[D]. 天津:天津大学, 2015.
|
|
GAO L J . Research on security authentication protocol of radio frequency identification system[D]. Tianjin:Tianjin University, 2015.
|
[11] |
汪洋 . 物联网轻量级认证和加密技术研究[D]. 南京:南京邮电大学, 2017.
|
|
WANG Y . Research on lightweight authentication and encryption technology of Internet of things[D]. Nanjing:Nanjing University of Posts and Telecommunications, 2017.
|
[12] |
吴伟民, 张晶晶, 彭家进 ,等. 基于混沌加密的轻量级 RFID 所有权转移协议[J]. 计算机工程与应用, 2018,54(9): 62-66.
|
|
WU W M , ZHANG J J , PENG J C ,et al. Lightweight RFID ownership transfer protocol based on chaos encryption[J]. Computer Engineering and Application, 2018,54(9): 62-66.
|
[13] |
PANDA M , NAG A . Plain text encryption using AES,DES and SALSA20 by java based bouncy castle API on Windows and linux[C]// Second International Conference on Advances in Computing and Communication Engineering. 2015: 541-548.
|
[14] |
SIVASANKARI M N , SUJATHA S . Performance metric analysis for mobile encryption algorithm using bouncy castle toolkit[C]// International Conference on Emerging Trends in Electrical and Computer Technology. 2011: 1097-1101.
|
[15] |
DAN B , . Simplified OAEP for the RSA and rabin functions[C]// Advances in Cryptology –CRYPTO. 2001: 275-91.
|
[16] |
CREMERS C , MAUW S . Operational semantics and verification of security protocols[M]// Information Security and Cryptography. Berlin: Springer, 2012.
|
[17] |
StatVerif . Verification of stateful processes[C]// IEEE 24th Computer Security Foundations Symposium. 2011: 33-47.
|
[18] |
ZHANG F , ZHAO Y W , MA D F ,et al. Formal verification of behavioral AADL models by stateful timed CSP[J]. IEEE Access, 2017,2: 27421-27438.
|
[19] |
ZHAO Y , ZHANG P F , WANG Y K ,et al. Troubleshooting data plane with rule verification in software-defined networks[J]. IEEE Transactions on Network and Service Management. 20171.
|
[20] |
YANG Y F , HUANG X L , CHENG S , CHEN S Y ,et al. A method of network verification with stateful header space analysis[C]// IEEE 22nd International Conference on Parallel and Distributed Systems (ICPADS). 2016: 232-238.
|
[21] |
NARAYAN S , ISHRAR S , KUMAR A ,et al. Performance analysis of 4 to 6 and 6 to 4 transition mechanisms over point to point and IPSec VPN protocols[C]// Thirteenth International Conference on Wireless and Optical Communications Networks (WOCN). 2016: 1-7.
|
[22] |
PETERSIDE G B , ZAVARSKY P , BUTAKO S . Automated security configuration checklist for a Cisco IPsec VPN router using SCAP 1.2[C]// 10th International Conference for Internet Technology and Secured Transactions (ICITST). 2015: 355-360.
|
[23] |
HOSSAIN M , HASAN R . Boot-IoT:a privacy-aware authentication scheme for secure bootstrapping of IoT Nodes[C]// IEEE International Congress on Internet of Things (ICIOT). 2017.
|
[24] |
康镇麒, 吕克伟 . RSA/Rabin-Paillier 陷门函数的比特安全性[J]. 密码学报, 2014,1(3): 244-254.
|
|
KANG Z Q , LV K W . On bit security of RSA/Rabin-paillier trapdoor functions[J]. Journal of Cryptologic Research, 2014,2: 244-254.
|