[1] |
PIRBHULAL S , ZHANG H , ALAHI M E ,et al. A novel secure IoT-based smart home automation system using a wireless sensor network[J]. Sensors, 2016,17(1): 6-9.
|
[2] |
LU Y R , LI L X , PENG H P ,et al. An anonymous two-factor authenticated key agreement scheme for session initiation protocol using elliptic curve cryptography[J]. Multimedia Tools &Applications, 2017,76(2): 1801-1815.
|
[3] |
ALTOP D K , BING?L M A , LEVI A ,et al. DKEM:secure and efficient distributed key establishment protocol for wireless mesh networks[J]. Ad Hoc Networks, 2016(54): 53-68.
|
[4] |
ABDALLA M , BENHAMOUDA F , POINTCHEVAL D . Public-key encryption indistinguishable under plaintext-checkable attacks[J]. Iet Information Security, 2016,10(6): 288-303.
|
[5] |
金宁, 张道远, 高建桥 ,等. 对称密码和非对称密码算法在无线传感器网络中应用研究[J]. 传感技术学报, 2011,24(6): 874-878.
|
|
JIN N , ZHANG D Y , GAO J Q ,et al. A study on the application of symmetric ciphers and asymmetric ciphers in wireless networks[J]. Chinese Journal of Sensors and Actuators, 2011,24(6): 874-878.
|
[6] |
王崇霞, 高美真, 刘倩 ,等. 混合云联合身份认证与密钥协商协议设计[J]. 电信科学, 2014,30(4): 95-99,108.
|
|
WANG C X , GAO M Z , LIU Q ,et al. Design of united identity authentication and key agreement protocol for hybrid cloud[J]. Telecommunications Science, 2014,30(4): 95-99,108.
|
[7] |
任伟 . 现代密码学[M]. 北京: 北京邮电大学出版社, 2011.
|
|
REN W . Modern cryptography[M]. Beijing: Beijing University of Posts and Telecommunications PressPress, 2011.
|