共 22 条
[1]
Yang Y., Zhang Y., Li Z., Et al., RAKA: New authenticated key agreement protocol based on Ring-LWE, Journal of Computer Research and Development, 54, 10, pp. 2187-2192, (2017)
[2]
Chen M., Strongly secure anonymous implicit authentication and key agreement for roaming service, Journal of Computer Research and Development, 54, 12, pp. 2772-2784, (2017)
[3]
Zhang Q., Gan Y., Wang R., Et al., Inter-cluster asymmetric group key agreement, Journal of Computer Research and Development, 55, 12, pp. 2651-2663, (2018)
[4]
Chen D., Research on physical layer security protocol in wireless network, (2014)
[5]
Waqas M., Ahmed M., Li Y., Et al., Social-aware secret key generation for secure device-to-device communication via trusted and non-trusted relays, IEEE Transactions on Wireless Communications, 17, 6, pp. 3918-3930, (2018)
[6]
Li G., Hu A., Zhang J., Et al., High-agreement uncorrelated secret key generation based on principal component analysis pre-processing, IEEE Transactions on Communications, 66, 7, pp. 3022-3034, (2018)
[7]
Sun D., Zheng C., Cui H., Et al., Developing status and some cutting-edge issues of underwater sensor network localization technology, Scientia Sinica Informationis, 48, 9, pp. 1121-1136, (2018)
[8]
Wang D., Shang E., Underwater Acoustics, (2013)
[9]
Bennett G.H., Brassard G., Crepeau C., Et al., Generalized privacy amplification, IEEE Transactions on Information Theory, 41, 6, pp. 1915-1923, (1995)
[10]
Khiabani Y.S., Wei S., A joint Shannon cipher and privacy amplification approach to attaining exponentially decaying information leakage, Information Sciences, 357, 3, pp. 6-22, (2016)