共 20 条
[1]
Bai Qing-hai, 2012, 2012 International Conference on Computer Science and Service System (CSSS), P1224, DOI 10.1109/CSSS.2012.310
[2]
Dworkin MJ, 2015, Federal Information ProcessingStandards, DOI DOI 10.6028/NIST.FIPS.202
[3]
Elshambakey M, 2017, IEEE INT CONF BIG DA, P4738, DOI 10.1109/BigData.2017.8258526
[4]
Fang XJ, 2017, 2017 3RD INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT (ICIM 2017), P412, DOI 10.1109/INFOMAN.2017.7950418
[5]
Haakegaard R., 2015, The elliptic curve diffie-hellman (ecdh)
[6]
A Lightweight ECC-Based Authentication Scheme for Internet of Things (IoT)
[J].
IEEE SYSTEMS JOURNAL,
2020, 14 (03)
:3440-3450
[7]
Li B., 2022, 2021 INT C ADV COMP, P1
[9]
Moller B., 2010, RFC 5639
[10]
Nakov S., 2018, Dans Practical cryptography for developers