[1]王鹏,李谢华,陆松年.基于认证测试方法的EAP-AKA协议分析[J].计算机工程与应用,2007,44(15):157-159
[2]董春冻,王聪,刘军,等.基于公钥的EAP-AKA协议改进及安全性分析[J].计算机工程与设计,2014,35(1):32-36
[3]李晓伟,张玉清,张格非,等.基于智能卡的强安全认证与密钥协商协议[J].电子学报,2014,42(8):1587-1593
[4]Koblitz N. Elliptic curve cryptosystems. Math Comput 1987;48(177):203-209
[5]Miller V S .Use of elliptic curves in cryptography[J]. Advances in Cryptology Crypto, 1986, 46(128):417-226
[6]Sui A F , Hui L C K , Yiu S M , et al. An improved authenticated key agreement protocol with perfect forward secrecy for wireless mobile communication[C]//Proc of IEEE Wireless Communications & Networking Conf. Piscataway,NJ:IEEE, 2005
[7]Lu R ,Cao Z ,Zhu H.An enhanced authenticated key agreement protocol for wireless mobile communication[J]. Computer Standards & Interfaces, 2007, 29(6):647-652
[8]He D. Weakness in an ECC-based AKA protocol for wireless mobile communications[J]. Computer Standards & Interfaces, 2011, 33(7):527-532
[9]Guo H , Xu C , Mu Y , et al. A provably secure authenticated key agreement protocol for wireless communications[J]. Computers & Electrical Engineering, 2012, 38(3):563-572
[10]李欣,吴旭东.基于CPK认证技术的移动安全接入系统[J].武汉理工大学学报:信息与管理工程版,2011,33(3):342-345
[11]侯整风,李岚.椭圆曲线密码系统(ECC)整体算法设计及优化研究[J].电子学报,2004,43(11):1904-1906
[12]曹建,陆建德.一种基于ECDH方案实现IKE密钥交互的分析与设计[J].计算机应用与软件,2008,25(5):53-55
[13]Shahbazi K , Eshghi M , Faghih Mirzaee R . Design and implementation of an ASIP-based cryptography processor for AES, IDEA, and MD5[J]. Engineering Science and Technology, an International Journal, 2017, 20(4):1308-1317
[14]Nell Olver. A note on hierarchical hubbing for a generalization of the VPN problem[J]. Operations Research Letters,2016,44(2):114-120
[15] Chen TienHo, Chen YenChiu. An Advanced ECC ID-Based Remote Mutual Authentication Scheme for Mobile Devices[M]. 2010
[16] Qin B , Huang J , Wang Q , et al. A decentralized PKI mitigating MitM attacks[J]. Future Generation Computer Systems, 2017,34(10):12-19
[17]于孟涛. WPKI/IBE认证方法研究及IBE系统的SIM卡私钥保存实现[D]. 长春:吉林大学,2009
|