[1] B Rao, L Minakakis.Evolution of mobile location-based services[J].Communications of the ACM, 2003, 46(12):61-65.
[2] 肖竹, 王勇超, 田斌, 于全, 易克初.超宽带定位研究与应用:回顾和展望[J].电子学报, 2011, 39(1):133-141. Xiao Zhu, Wang Yongchao, Tian Bin, Yu Quan, Yi Kechu.UWB positioning research and application:review and outlook[J].Acta Electronica Sinica, 2011, 39(1):133-141.(in Chinese)
[3] 林云松, 孙卓振, 彭良福.基于Bancroft算法的多点定位TOA-LS估计[J].电子学报, 2012, 40(3):621-624. Lin Yunsong, Sun Zhuozhen, Peng Liangfu.Multipoint positioning TOA-the LS estimate of the algorithm based on the Bancroft[J].Acta Electronica Sinica, 2012, 40(3):621-624.(in Chinese)
[4] D Liu, P Ning.Location-based pairwise key establishments for static sensor networks[A].Proceedings of the 1st ACM Workshop on Security of ad hoc and Sensor Networks[C].ACM, 2003.72-81.
[5] C Yang, J Xiao.Location-based pairwise key establishment and data authentication for wireless sensor networks[A].Information Assurance Workshop[C].IEEE, 2006.247-252.
[6] D Huang, M Mehta, D Medhi, L Harn.Location-aware key management scheme for wireless sensor networks[A].2nd ACM Workshop on Security of ad hoc and Sensor Networks[C].ACM, 2004.29-39.
[7] M Younis, K Ghumman, M Eltoweissy.Location-aware combinatorial key management scheme for clustered sensor networks[J].IEEE Transactions on Parallel and Distributed Systems, 2006, 17(8):865-882.
[8] Y Zhang, W Liu, W Lou, Y Fang.Securing sensor networks with location-based keys[A].IEEE Wireless Communications and Networking Conference[C].IEEE, 2005.1909-1914.
[9] Yanchao Zhang, Wei Liu, Wenjing Lou, Yuguang Fang.Location-based compromise-tolerant security mechanisms for wireless sensor networks[J].IEEE J Select Areas Commun, 2006, 24(2):247-260.
[10] N Chandran, V Goyal, R Moriarty, R Ostrovsky.Position-based Cryptography[A].Advances in Cryptology-CRYPTO 2009[C].Berlin:Springer-Verlag, 2009.391-407.
[11] H Buhrman, N Chandran, S Fehr, R Gelles, V Goyal, R Ostrovsky, C Schaffner.Position-based quantum crypto-graphy:impossibility and constructions[A].Advances in Cryptology-CRYPTO 2011[C].Berlin:Springer-Verlag, 2011.429-446.
[12] H K Lau, H K Lo.Insecurity of position-based quantum-cryptography protocols against entanglement attacks[J].Physical Review A, 2011, 83(1):012322.
[13] M Tomamichel, S Fehr, J Kaniewski, S Wehner.One-sided device-independent QKD and position-based cryptography from monogamy games[A].Advances in Cryptology-EUROCRYPT 2013[C].Berlin:Springer-Verlag, 2013.609-625.
[14] Junwei Zhang, Jianfeng Ma, Chao Yang.Protocol derivation system for the Needham-Schroeder family[J].Wiley Online Library, 2012.DOI:10.1002/sec.565.
[15] A Perrig, R Szewczyk, J D Tygar, V Wen, D E Culler.SPINS:security protocols for sensor networks[A].ACM Conference on Mobile Computing and Networks[C].ACM, 2001.189-199.
[16] J Zhang, J Ma, S Moon.Universally composable one-time signature and broadcast authentication[J].Sci China Inf Sci, 2010, 53(3):567-580.
[17] R Canetti, H Krawczyk.Analysis of key-exchange protocols and their use for building secure channels[A].Advances in Cryptology-EUROCRYPT 2001[C].Berlin:Springer-Verlag, 2001.2045:453-474. |