[1] Jiang Y X,Lin C,Shen X M.Mutual authentication and key exchange protocols for roaming services in wireless mobile networks[J].IEEE Transactions on Wireless Communications,2006,5(9):569-2577.
[2] Yang G M,Wong D S,Deng X T.Anonymous and authenticated key exchange for roaming networks[J].IEEE Transactions on Wireless Communications,2007,6(9):035-1042.
[3] Shi M H,Rutagemwa H,Shen X M.A service-agent-based roaming architecture for WLAN/cellular integrated networks[J].IEEE Transactions on Vehicular Technology,2007,56(5):168-3181.
[4] 彭华熹.一种基于身份的多信任域认证模型[J].计算机学报,2006,29(8):1271-1281. Peng Hua-xi.An ientity-bsed athentication mdel for mlti-dmain[J].Chinese Journal of Computer,2006,29(8),1271-1281.(in Chinese)
[5] 姜奇,马建峰,等.基于身份的异构无线网络匿名漫游协议[J].通信学报,2010,31(10):138-145. Jiang Qi,Ma Jianfeng,et al.Identity-based roaming protocol with anonymity for heterogeneous wireless networks[J].Journal on Communications,2010,31(10):138-145.(in Chinese)
[6] 朱辉,李晖,苏万力,等.基于身份的匿名无线认证方案[J].通信学报,2009,30(4):130-136. Zhu Hui,Li Hui,Su Wanli,et,al.ID-based wireless authentication scheme with anonymity[J].Journal on Communications,2010,31(10):138-145.(in Chinese)
[7] 姜奇,李光松,马建峰,等.基于身份的无线认证方案的安全缺陷及改进[J].通信学报,2010,31(9A),209-216. Jiang Qi,Li Guangsong,Ma Jianfeng,et,al.Security flaws and improvement of an id-based wireless authentication scheme with anonymity[J].Journal on Communications,2010,31(9A):209-216.(in Chinese)
[8] 张胜,徐爱国,胡正名,等.一种基于身份的一次性公钥的构造[J].电子与信息学报,2006,28(8):1412-1414. Zhang Sheng,Xu Ai-guo,Hu Zheng-ming.et,al.Construction of the one-off public key based on identity[J].Journal of Electronics & Information Technology,2006,28(8):1412-1414.(in Chinese)
[9] 罗长远,霍士伟,刑洪智.普适环境中基于一次性公钥的匿名认证方案[J],通信学报,2012,33(2):93-98. Luo Chang-yuan,Huo Shi-wei,Xing Hong-zhi.Anonymous authentication scheme based on one-off public key in pervasive computing environments[J].Journal on Communications,2012,33(2):93-98.(in Chinese)
[10] 张恩,蔡永泉.基于双线性对的可验证的理性秘密共享方案[J].电子学报,2012,40(5):1050-1054. Zhang En,Cai Yong-quan.A werifiable rational secret sharing scheme based on bilinear pairing[J].Acta Electronica Sinica,2012,40(5):1050-1054.(in Chinese)
[11] Canerri R,Krawczyk H.Analysis of key exchange and their use for building secure channels[J].Proceedings of the Eurocrypt.Springer-Verlage,2001,452-474.
[12] 姜奇,马建峰,李光松,等.基于WAPI的WLAN与3G网络安全融合[J].计算机学报,2010,33(9):1675-1685. Jiang Qi,Ma Jianfeng,Li Guangsong,et,al.Security integration of WAPI based WLAN and 3G[J].Chinese Journal of Computer,2010,33(9):1675-1685.(in Chinese)
[13] Tin Y S T,Vasanta H,Boyd C.Protocols with security proofs for mobile applications[A].Proceedings of the ACISP 2004[C].Sydney,Australia,2004.358-369.
[14] Tin Y S T,Boyd C,Nieto J G.Provably secure key exchange:an engineering approach[A].Proceedings of the Australasian Information Security Workshop[C].Darlinghurst,Australasian,2003.97-104.
[15] Yang G M,Wong D S,Deng X T.Formal security definition and efficient construction for roaming with a privacy-preserving extension[J].Journal of Universal Computer Science,2008,14(3):441-462. |