共 56 条
- [1] Ajtai M., 1996, Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, P99, DOI 10.1145/237814.237838
- [2] Alkim Erdem, 2016, Security, Privacy and Applied Cryptography Engineering. 6th International Conference, SPACE 2016. Proceedings: LNCS 10076, P332, DOI 10.1007/978-3-319-49445-6_19
- [3] A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 78 : 1005 - 1019
- [4] NTRU Prime: Reducing Attack Surface at Low Cost [J]. SELECTED AREAS IN CRYPTOGRAPHY - SAC 2017, 2018, 10719 : 235 - 260
- [5] Bestavros A., 2004, SEP STABLE ELECTION
- [6] Bonomi F.., 2012, P 1 EDITION MCC WORK, P13, DOI [10.1145/2342509.2342513, DOI 10.1145/2342509.2342513]
- [7] Buchmann J., 2016, Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security - IoTPTS'16, (Xi'an, China), P2
- [10] Coppersmith D., 1997, Advances in Cryptology - EUROCRYPT '97. International Conference on the Theory and Application of Cryptographic Techniques Proceedings, P52