[1] ZOU Y,WANG X,HANZO L.A survey on wireless security:technical challenges,recent advances and future trends[J].Proceedings of the IEEE,2016,104(9):1727-1765.
[2] JIANG Y,LIN C,SHEN X,et al.Mutual authentication and key exchange protocols for roaming services in wireless mobile networks[J].IEEE Transactions on Wireless Communications,2006,5(9):2569-2577.
[3] 曹春杰,杨超,马建峰,等.WLAN Mesh漫游接入认证协议[J].计算机研究与发展,2009,46(7):1102-1109. CAO Chun-jie,YANG Chao,MA Jian-feng,et al.An authentication protocol for station roaming in WLAN mesh[J].Journal of Computer Research and Development,2009,46(7):1102-1109.(in Chinese)
[4] 王良民,姜顺荣,郭渊博.物联网中移动Sensor节点漫游的组合安全认证协议[J].中国科学:信息科学,2012,42(7):815-830. WANG Liang-min,JIANG Shun-rong,GUO Yuan-bo.Composable secure authentication protocol for mobile sensors roaming in the Internet of things[J].Scientia Sinica (Informationis),2012,42(7):815-830.(in Chinese)
[5] MUN H,HAN K,LEE Y S,et al.Enhanced secure anonymous authentication scheme for roaming service in global mobility networks[J].Mathematical and Computer Modelling,2012,55(1-2):214-222.
[6] SHIN S,YEH H,KIM K.An efficient secure authentication scheme with user anonymity for roaming user in ubiquitous networks[J].Peer-to-Peer Networking and Applications,2015,8(4):674-683.
[7] YANG G,HUANG Q,WONG D S,et al.Universal authentication protocols for anonymous wireless communications[J].IEEE Transactions on Wireless Communications,2010,9(1):168-174.
[8] HE D,CHEN C,CHAN S,et al.Secure and efficient handover authentication based on bilinear pairing functions[J].IEEE Transactions on Wireless Communications,2012,11(1):48-53.
[9] JO H J,PAIK J H,LEE D H.Efficient privacy-preserving authentication in wireless mobile networks[J].IEEE Transactions on Mobile Computing,2014,13(7):1469-1481.
[10] TSAI J L,LO N W.Provably secure anonymous authentication with batch verification for mobile roaming services[J].Ad Hoc Networks,2016,44:19-31.
[11] 周彦伟,杨波.物联网移动节点直接匿名漫游认证协议[J].软件学报,2015,26(9):2436-2450. ZHOU Yan-wei,YANG Bo.Provable secure authentication protocol with direct anonymity for mobile nodes roaming service in Internet of things[J].Journal of Software,2015,26(9):2436-2450.(in Chinese)
[12] 周彦伟,杨波,张文政.安全高效的异构无线网络可控匿名漫游认证协议[J].软件学报,2016,27(2):451-465. ZHOU Yan-wei,YANG Bo,ZHANG Wen-zheng.Secure and efficient roaming authentication protocol with controllable anonymity for heterogeneous wireless network[J].Journal of Software,2016,27(2):451-465.(in Chinese)
[13] 周彦伟,杨波,张文政.异构无线网络可控匿名漫游认证协议[J].电子学报,2016,44(5):1117-1123. ZHOU Yan-wei,YANG Bo,ZHANG Wen-zheng.Controllable and anonymous roaming protocol for heterogeneous wireless network[J].Acta Electronica Sinica,2016,44(5):1117-1123.(in Chinese)
[14] CANETTI R,KRAWCZYK H.Analysis of key-exchange protocols and their use for building secure channels[A].Proceedings of the Advances in Cryptology-Eurocrypt (LNCS 2045)[C].Berlin:Springer,2001.453-474.
[15] 陈明.强安全的匿名隐式漫游认证与密钥协商方案[J].计算机研究与发展,2017,54(12):2772-2784. CHEN Ming.Strongly secure anonymous implicit authentication and key agreement for roaming service[J].Journal of Computer Research and Development,2017,54(12):2772-2784.(in Chinese)
[16] LAMACCHIA B A,LAUTER K,MITYAGIN A.Stronger security of authenticated key exchange[A].Proceedings of the First International Conference on Provable Security (LNCS 4784)[C].Berlin:Springer,2007.1-16.
[17] DIFFIE W,HELLMAN M.New directions in cryptography[J].IEEE Transactions on Information Theory,1976,22(6):644-654.
[18] SCHNOOR C P.Efficient signature generation for smart card[J].Journal of Cryptology,1991,4(3):161-174.
[19] 陈明.标准模型下可托管的基于身份认证密钥协商[J].电子学报,2015,43(10):1954-1962. CHEN Ming.Escrowable identity-based authenticated key agreement in the standard model[J].Acta Electronica Sinica,2015,43(10):1954-1962.(in Chinese)
[20] SHAMIR A.Identity-based cryptosystems and signature schemes[A].Proceedings of the Advances in Cryptology-Crypto (LNCS196)[C].Berlin:Springer,198.47-53.
[21] HE D,CHAN S,GUIZANI M.Handover authentication for mobile networks:security and efficiency aspects[J].IEEE Network,2015,29(3):96-103.
[22] CAO X,KOU W,DANG L,et al.IMBAS:Identity-based multi-user broadcast authentication in wireless sensor networks[J].Computer Communications,2008,31(4):659-667. |