[1] |
DARIO D C , ANTONIO S , GEORG T . SWIM- a next generation ATM information bus-the SWIM-SUIT prototype[A]. 2010 14th IEEE International Enterprise Distributed Object Computing Conference Workshops (EDOCW)[C]. 2010.41-46.
|
[2] |
吕小平, 齐鸣 . 浅谈SWIM[J]. 民航管理, 2009,(5): 68-69. LV X P , QI M . A brief discussion of SWIM[J]. Civil Aviation Man-agement, 2009,(5): 68-69.
|
[3] |
BOB S . Security architecture for system wide information manage-ment[J]. The 24th 2005 Digital Avionics Systems Conference (DASC 2005)[C]. 2005.
|
[4] |
BOB S . System-wide information management (SWIM) demonstra-tion security architecture[J]. 2006 IEEE/AIAA 25th Digital Avionics Systems Conference[C]. 2006.1-12.
|
[5] |
Federal Aviation Administration. System Wide Information Manage-ment (SWIM) eXtensible Markup Language (XML) Gateway Re-quirements[S]. 2009.
|
[6] |
International Civil Aviation Organization. Web service security stan-dards[A]. Aeronautical Telecommunication Network Implementation Coordination Group-Eighth Working Group Meeting[C]. Christchurch New Zealand, 2010.
|
[7] |
邱锡鹏, 刘海鹏 . Diameter 协议研究[J]. 计算机科学, 2013,30(2): 75-78. QIU X P , LIU H P . Research on diameter protocols[J]. Computer Sci-ence, 2013,30(2): 75-78.
|
[8] |
IETF RFC3588. Diameter Base Protocol[S]. 2003.
|
[9] |
IETF RFC3748. Extensible Authentication Protocol(EAP)[S]. 2004.
|
[10] |
IETF RFC 4072, Diameter Extensible Authentication Protocol(EAP) Application[S]. 2005.
|
[11] |
陈凤其, 姚国祥 . 一种基于Hash函数的EAP认证协议[J]. 计算机系统应用, 2010,19(6): 74-77. CHEN F Q , YAO G X . A hash-based EAP authentication protocl[J]. Computer Systems & Applications, 2010,19(6): 74-77.
|
[12] |
陈世伟, 金晨辉 . MD5碰撞攻击中的充要条件集[J]. 软件学报, 2009,20(6): 1617-1624. CHEN S W , JIN C H . Set of necessary and sufficient conditions in collision attacks on MD5[J]. Journal of Software, 2009,20(6): 1617-1624.
|
[13] |
赵志新, 祝跃飞, 梁立明 . 无线局域网隧道认证协议 PEAP 的分析与改进[J]. 信息工程大学学报, 2005,6(3): 52-55. ZHAO Z X , ZHU Y F , LIANG L M The analysis and mend of PEAP protocol in WLAN[J]. Journal of Information Engineering University, 2005,6(3): 52-55.
|
[14] |
吉晓东 . 支持身份隐藏的EAP-PSK协议改进[J]. 南通大学学报(自然科学版), 2007,6(2): 74-77. JI X D Improvement of EAP-PSK protocol enabling identity pri-vacy[J]. Journal of Nantong University (Natural Science), 2007,6(2): 74-77.
|
[15] |
王志中 . MD5算法在口令认证中的安全性改进[J]. 电脑知识与技术, 2012,8(2): 296-297. WANG Z Z Security improvement of MD5 algorithm in password authentication[J]. JComputer Knowledge and Technology, 2012,8(2): 296-297.
|