[1] |
易平, 蒋嶷川, 张世永 . 移动ad hoc网络安全综述[J]. 电子学报, 2005,33(5): 893-899. YI P , JIANG N C , ZHANG S Y . A survey of security for mobile ad hoc networks[J]. Acta Electronica Sinica, 2005,33(5): 893-899.
|
[2] |
华平, 胡光明, 董攀 . 大规模移动自组网络安全技术综述[J]. 计算机研究与发展, 2007,44(4): 545-552. HUA P , HU G M , DONG P . Survey of security technology for large scal manet[J]. Journal of Computer Research and Development, 2007,44(4): 545-552.
|
[3] |
SHAMIR A . Identity-based cryptosystems and signature schemes[A]. Proceedings of the Advances in Cryptology-CRYPTO’84[C]. Berlin: Springer, 1984. 47-53.
|
[4] |
BONEH D , FRANKLIN M . Identity-based encryption from the weil pairing[J]. SIAM Journal of Computing, 2000,32(3): 586-615.
|
[5] |
KHALILI A , KATZ J , ARBAUGH W A . Toward secure key distribution in truly ad hoc networks[A]. International Symposium on Applications and the Internet[C]. Orlando,USA, 2003. 342-346.
|
[6] |
DENG H , AGRAWAL D . TIDS:threshold and identity-based security scheme for wireless ad hoc networks[J]. Ad Hoc Networks, 2004,2(3): 291-307.
|
[7] |
SILVA E , SANTOS A L , ALBINI L C P . Identity-based key management in mobile ad hoc networks:techniques and applications[J]. IEEE Wireless Communications, 2008,15(5): 46-52.
|
[8] |
CHIEN H Y , LIN R Y . Improved ID-based security framework for ad hoc network[J]. Ad Hoc Networks, 2008,6(1): 47-60.
|
[9] |
SUN J Y , ZHANG C , ZHANG Y C . An identity-based security system for user privacy in vehicular ad hoc networks[J]. IEEE Transactions on Parallel and Distributed Systems, 2010,21(9): 1227-1239.
|
[10] |
南湘浩 . CPK密码体制与网际安全[M]. 北京: 北京国防工业出版社, 2008. NAN X H . CPK-Crypotosystem and Cyber Security[M]. Beijing: National Defence Industry Press, 2008.
|
[11] |
ESCHENAUER L , GLIGOR V D . A key-management scheme for distributed sensor networks[A]. Proceedings of the 9th ACM Conference on Computer and Communication Security[C]. Chicago,USA, 2002. 41-47.
|
[12] |
RAMKUMAR M , MEMON N . An efficient key predistribution scheme for ad hoc network security[J]. IEEE Journal on Selected Areas in Communications, 2005,23(3): 611-621.
|
[13] |
胡亮, 刘哲理, 孙涛 . 基于身份的密码学的安全性研究综述[J]. 计算机研究与发展, 2009,46(9): 1537-1548. HU L , LIU Z L , SUN T . Survey of security on identity-based cryptography[J]. Journal of Computer Research and Development, 2009,46(9): 1537-1548.
|
[14] |
ELGAMAL T . A public key cryptosystem and a signature scheme based on discrete logarithms[J]. IEEE Transactions on Information Theory, 1985,31(4): 469-472.
|
[15] |
The NS manual (formerly ns notes and documentation)[EB/OL]. , 2011.
|
[16] |
HAN L , LIU J Q , ZHANG D W . A portable TPM scheme for generalpurpose trusted computing based on EFI[A]. MINES'09:International Conference on Multimedia Information Networking and Security[C]. Wuhan,China, 2009. 140-143.
|
[17] |
HAN L , LIU J Q , HAN Z . Design and implementation of a portable TPM scheme for general-purpose trusted computing based on EFI[J]. Frontiers of Computer Science in China, 2011,5(2): 169-180.
|