[1] |
ROMAN R , ZHOU J , LOPEZ J . On the features and challenges of security and privacy in distributed internet of things[J]. Computer Networks, 2013,57(10): 2266-2279.
|
[2] |
武传坤 . 物联网安全关键技术与挑战[J]. 密码学报, 2015,2(1): 40-53.
|
|
WU C K . An overview on the security techniques and challenges of the Internet of things[J]. Journal of Cryptologic Research, 2015,2(1): 40-53.
|
[3] |
张玉清, 周威, 彭安妮 . 物联网安全综述[J]. 计算机研究与发展, 2017,54(10): 2130-2143.
|
|
ZHANG Y Q , ZHOU W , PENG A N . Survey of Internet of things security[J]. Journal of Computer Research and Development, 2017,54(10): 2130-2143.
|
[4] |
HINAREJOS F , LOPEZ J , MONTENEGRO J A ,et al. Pervasive authentication and authorization infrastructures for mobile users[J]. Computers & Security, 2010,29(4): 501-514.
|
[5] |
LEE D G , KANG S I , SEO D H ,et al. Authentication for single/multi domain in ubiquitous computing using attribute certification[C]// International Conference on Computational Science and ITS Applications. 2006: 326-335.
|
[6] |
AYE N , KHIN H S , WIN T T ,et al. Multi-domain public key infrastructure for information security with use of a multi-agent system[M]. Intelligent Information and Database Systems. Berlin: Springer, 2013: 365-374.
|
[7] |
BELLARE M , NAMPREMPRE C , NEVEN G . Security proofs for identity-based identification and signature schemes[C]// Advances in Cryptology Eurocrypt 2004. 2004: 268-286.
|
[8] |
罗长远, 霍士伟, 邢洪智 . 普适环境中基于身份的跨域认证方案[J]. 通信学报, 2011,32(9): 111-115.
|
|
LUO C Y , HUO S W , XING H Z . Identity-based cross-domain authentication scheme in pervasive computing environments[J]. Journal on Communications, 2009,30(4): 130-136.
|
[9] |
GENTRY C , . Certificate-based encryption and the certificate revocation problem[C]// International Conference on Theory and Applications of Cryptographic Techniques. 2003: 272-293.
|
[10] |
KANG B G , PARK J H , SANG G H . A certificate-based signature scheme[C]// Cryptolograheres Track Research Conference. 2004: 99-111.
|
[11] |
LIU J K , BAEK J , SUSILO W ,et al. Certificate-based signature schemes without pairings or random oracles[C]// International Conference on Information Security. 2008: 285-297.
|
[12] |
朱辉, 李晖, 苏万力 ,等. 基于身份的匿名无线认证方案[J]. 通信学报, 2009,30(4): 130-136.
|
|
ZHU H , LI H , SHU W L ,et al. ID-based wireless authentication scheme with anonymity[J]. Journal on Communications, 2009,30(4): 130-136.
|
[13] |
LI J , WANG Z , ZHANG Y . Provably secure certificate-based signature scheme without pairings[M]. Elsevier Science Inc. 2013: 313-320.
|
[14] |
LI J , HUANG X , MU Y ,et al. Certificate-based signature:security model and efficient construction[J]. Public Key Infrastructure, 2007,(4582): 110-125.
|
[15] |
VERMA G K , SINGH B B . Short certificate-based proxy signature scheme from pairings[J]. Transactions on Emerging Telecommunications Technologies, 2017(1): 3214.
|
[16] |
ZHANG Y , LI J G , WANG Z ,et al. A new efficient certificate-based signature scheme[J]. Chinese Journal of Electronics, 2015,24(4): 776-782.
|
[17] |
MAN H A , LIU J K , SUSILO W ,et al. Certificate based (linkable) ring signature[C]// International Conference on Information Security Practice and Experience. 2007: 79-92.
|
[18] |
彭华熹, 冯登国 . 匿名无线认证协议的匿名性缺陷和改进[J]. 通信学报, 2006,27(9): 78-85.
|
|
PENG H X , FENGDG . Security flaws and improvement to a wireless authentication protocol with anonymity[J]. Journal on Communications, 2006,27(9): 78-85.
|