[1] |
李凤华, 殷丽华, 吴巍 ,等. 天地一体化信息网络安全保障技术研究进展及发展趋势[J]. 通信学报, 2016,37(11): 156-168.
|
|
LI F H , YIN L H , WU W ,et al. Research status and development trends of security assurance for space-ground integration information network[J]. Journal on Communications, 2016,37(11): 156-168.
|
[2] |
CHEN C L , CHENG K W , CHEN Y L ,et al. An improvement on the self-verification authentication mechanism for a mobile satellite communication system[J]. Applied Mathematics & Information Sciences, 2014,8(1L): 97-106.
|
[3] |
ZHAO W , ZHANG A , LI J ,et al. Analysis and design of an authentication protocol for space information network[C]// IEEE Military Communications Conference on MILCOM. IEEE, 2016: 43-48.
|
[4] |
LIU Y , ZHANG A , LI J ,et al. An anonymous distributed key management system based on CL-PKC for space information network[C]// IEEE International Conference on Communications (ICC). 2016: 1-7.
|
[5] |
HE D , BU J , CHAN S ,et al. Privacy-preserving universal authentication protocol for wireless communications[J]. IEEE Transactions on Wireless Communications, 2011,10(2): 431-436.
|
[6] |
LIU J K , CHU C K , CHOW S S M ,et al. Time-bound anonymous authentication for roaming networks[J]. IEEE Transactions on Information Forensics and Security, 2015,10(1): 178-189.
|
[7] |
CRUICKSHANK H S , . A security system for satellite networks[C]// Fifth International Conference on Satellite Systems for Mobile Communications and Navigation,IET. 1996: 187-190.
|
[8] |
HWANG M S , YANG C C , SHIU C Y . An authentication scheme for mobile satellite communication systems[J]. ACM SIGOPS Operating Systems Review, 2003,37(4): 42-47.
|
[9] |
CHANG Y F , CHANG C C . An efficient authentication protocol for mobile satellite communication systems[J]. ACM SIGOPS Operating Systems Review, 2005,39(1): 70-84.
|
[10] |
CHEN T H , LEE W B , CHEN H B . A self-verification authentication mechanism for mobile satellite communication systems[J]. Computers& Electrical Engineering, 2009,35(1): 41-48.
|
[11] |
JIANG Y , LIN C , SHEN X ,et al. Mutual authentication and key exchange protocols for roaming services in wireless mobile networks[J]. IEEE Transactions on Wireless Communications, 2006,5(9): 2569-2577.
|
[12] |
YANG G , WONG D S , DENG X . Anonymous and authenticated key exchange for roaming networks[J]. IEEE Transactions on Wireless Communications, 2007,6(9): 3461-3472.
|
[13] |
YANG G , WONG D S , DENG X . Formal security definition and efficient construction for roaming with a privacy-preserving extension[J]. Journal of Universal Computer Science, 2008,14(3): 441-462.
|
[14] |
BENALOH J C , MARE M D . One-way accumulators:a decentralized alternative to digital signatures[C]// Workshop on the Theory and Application of of Cryptographic Techniques. 1993: 274-285.
|
[15] |
BLOOM B H . Space/time trade-offs in hash coding with allowable errors[J]. Communications of the ACM, 1970,13(7): 422-426.
|
[16] |
MUKHERJEE J , RAMAMURTHY B . Communication technologies and architectures for space network and interplanetary internet[J]. IEEE Communications Surveys & Tutorials, 2013,15(2): 881-897.
|
[17] |
AKYILDIZ I F , UZUNALIO?LU H , BENDER M D . Handover management in low earth orbit (LEO) satellite networks[J]. Mobile Networks and Applications, 1999,4(4): 301-310.
|
[18] |
HE D , BU J , CHAN S ,et al. Handauth:efficient handover authentication with conditional privacy for wireless networks[J]. IEEE Transactions on Computers, 2013,62(3): 616-622.
|