[1] |
MOHAMED H E , MUHAMMAD K K , KHALED A . One-time password system with infinite nested hash chains[J]. Communications in Computer and Information Science, 2010,122: 161-170.
|
[2] |
RAMKUMAR M , MEMON N . An efficient random key pre-distribution scheme[A]. IEEE Global Telecommunications Conference(GLOBECOM'04)[C]. Los Angeles,USA, 2004. 2218-2223.
|
[3] |
SUN Y , CAO Y F , TANG L R . A multi-phase key pre-distribution scheme based on hash chain[A]. 2012 9th International Conference on Fuzzy Systems and Knowledge Discovery(FSKD)[C]. Sichuan,China, 2012. 2061-2064.
|
[4] |
CHEN L , ZHANG H J , LIU N . Authentication and micropayment protocols based on self-updating hash chains[A]. The Sixth International Conference on Grid and Cooperative Computing (GCC)[C]. Los Alamitos,CA,USA, 2007. 467-472.
|
[5] |
LIU D G , NING P . Multi-level μ TESLA:broadcast authentication for distributed sensor networks[J]. ACM Transactions on Embedded Computing System (TECS), 2004,3(4): 800-836.
|
[6] |
OSCAR D M , AMPARO F S , JOSE M S . A light-weight authentication scheme for wireless sensor networks[J]. Ad Hoc Networks, 2011,9(5): 727-735.
|
[7] |
EMAD A , MOHAMMED B , HOSSAM A . Hash chain links resynchronization methods in video streaming security:performance comparison[J]. Journal of Mobile Multimedia, 2011,7(1): 89-112.
|
[8] |
GABRIELE O , STEFANO C , ROBERTO D P , et al. Robust and efficient authentication of video stream broadcasting. ACM Transactions on Information and System Security (TISSEC), 2011,14(1): 1-25.
|
[9] |
赵源超, 李道本 . 可再生散列链的精巧构造. 电子与信息学报, 2006,28(9):1717-1720. ZHAO Y , LI D B . An elegant construction of re-initializable hash chains[J]. Journal of Electronics & Information Technoloy, 2006,28(9):1717-1720.
|
[10] |
GOYAL V . How to re-initialize a hash chain[EB/OL]. , 2004.
|
[11] |
ZHANG H J , ZHU Y F . Self-updating hash chains and their implementations. Lecture Notes in Computer Science, 2006,4255: 387-397.
|
[12] |
ZHANG H J . A novel self-renewal hash chain and its implementation[A]. IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC'08)[C]. Shanghai,China, 2008. 144-149.
|
[13] |
ZHANG M Q , DONG B , YANG X Y . A new self-updating hash chain scheme[A]. International Conference on Computational I telligence and Security (CIS'09)[C]. Beijing,China, 2009. 315-318.
|
[14] |
ZHANG W . Self-updating hash chains based on erasure coding[A]. 2010 International Conference on Computer,Mechatronics,Control and Electronic Engineering (CMCE)[C]. Changchun,China, 2010. 173-175.
|
[15] |
YANG X Y , WANG J J , CHEN J Y . A self-renewal hash chain scheme based on fair exchange idea (SRHC-FEI)[A]. 2010 3rd IEEE International Conference on Computer Science and Infor ion Technology (ICCSIT'10)[C]. Chengdu,China, 2010. 152-156.
|
[16] |
ULUTAS M , NABIYEV V V , ULUTAS G . A new secret image sharing technique based on Asmuth Bloom's scheme[A]. International Conference on Application of Information and Communication Technologies(AICT)[C]. Baku,Azerbaijan, 2009. 1-5.
|
[17] |
LEIN H , LIN C L . Strong (n,t,n) verifiable secret sharing scheme[J]. Information Sciences, 2010,180: 3059-3064.
|