|
[1]
|
Weiser, M. (1991) The Computer for the Twenty-First Century. Scientific American, 265, 94-104. [Google Scholar] [CrossRef]
|
|
[2]
|
Leung, A. and Mitchell, C.J. (2007) Ninja: Non Identity Based, Privacy Preserving Authentication for Ubiquitous Environments. In: Krumm, J., Abowd, G.D., Seneviratne, A. and Strang, T., Eds., UbiComp 2007: Ubiquitous Computing. UbiComp 2007. Lecture Notes in Computer Science, Vol. 4717, Springer, Berlin, 73-90. [Google Scholar] [CrossRef]
|
|
[3]
|
武海鹰, 基于上下文的普适计算使用控制模型[J]. 计算机应用, 2012,32(2): 489-492.
|
|
[4]
|
高大利, 孙凌, 辛艳. 基于角色-权限的普适计算受限委托方法[J]. 计算机应用, 2011, 31(5): 1298-1301.
|
|
[5]
|
彭华熹, 冯登国. 匿名无线认证协议的匿名性缺陷和改进[J]. 通信学报, 2006, 27(9): 78-85.
|
|
[6]
|
彭华熹. 一种基于身份的多信任域认证模型[J]. 计算机学报, 2006, 29(8): 1271-1281.
|
|
[7]
|
Cao, X.F., Zeng, X.W., Kou, W.D. and Hu, L.B. (2009) Identity-Based Anonymous Remote Authentication for Value-Added Services in Mobile Networks. IEEE Transactions on Vehicular Technology, 58, 3508-3517. [Google Scholar] [CrossRef]
|
|
[8]
|
Al-Riyami, S.S. and Paterson, K.G. (2003) Certificateless Public Key Cryptography. In: Laih, CS. Eds., Advances in Cryptology-ASIACRYPT 2003. ASIACRYPT 2003. Lecture Notes in Computer Science, Vol. 2894, Springer, Berlin, Heidelberg, 452-473. [Google Scholar] [CrossRef]
|
|
[9]
|
Dai, W. (2004) Crypto++ 5.2.1 Benchmarks. https://www.cryptopp.com/wiki/Main_Page
|
|
[10]
|
Zhang, Y., Liu, W., Lou, W. and Fang, Y. (2006) Securing Mobile Ad Hoc Networks with Certificateless Public Keys. IEEE Transactions on Dependable and Secure Computing, 3, 386-399. [Google Scholar] [CrossRef]
|
|
[11]
|
Ren, K., Lou, W., Zeng, K. and Moran, P.J. (2007) On Broadcast Authentication in Wireless Sensor Networks. IEEE Transactions on Wireless Communications, 6, 4136-4144. [Google Scholar] [CrossRef]
|
|
[12]
|
MIRACL (2012) Multiprecision Integer and Rational Arithmetic C/C++ Library. http://indigo.ie/~mscott/
|