共 11 条
[1]
Michael K.R., Aviel D.R., Crowds: anonymity for web transactions, ACM Transactions on Information and System Security (TISSEC), 1, 1, pp. 66-92, (1998)
[2]
Wan R.-F., Li F.-W., Zhu J., An efficient anonymity mutual authentication protocol, Journal of University of Electronic Science and Technology of China, 34, 1, pp. 61-64, (2005)
[3]
Feng G.-Z., Li C., Wu Y., An efficient anonymous authentication and key agreement protocol, Computer Engineering and Application, 42, 19, pp. 3-7, (2006)
[4]
Deng S.-Y., Hu Z.-M., Niu X.-X., Et al., A wireless mutual authentication and key agreement protocol, Acta Electronica Sinica, 31, 1, pp. 135-138, (2003)
[5]
Sherman S.M., Chow and kim-kwang raymond choo, strongly-secure identity-based key agreement and anonymous extension, ISC 2007, LNCS 4779, pp. 203-220, (2007)
[6]
Cheng Z., Chen L., Comley R., Et al., Identity-based key agreement with unilateral identity privacy using pairings, ISPEC 2006, LNCS 3903, pp. 202-213, (2006)
[7]
Wan Z.-G., Ren K., Lou W.-J., Et al., Anonymous ID-based group key agreement for wireless networks, Wireless Communications and Networking Conference, pp. 2615-2620, (2008)
[8]
Li F.-G., Shirase M., Takagi T., Analysis and improvement of authenticatable ring signcryption scheme, Journal of Shanghai Jiaotong University: Science, 13, 6, pp. 679-683, (2008)
[9]
Li X.-H., Ma J.-F., Wen X.-Z., Security extension for the canetti-krawczyk model in identity-based systems, Science in China, (Series E), 34, 10, pp. 1185-1192, (2004)
[10]
Canetti R., Krawczyk H., Analysis of key-exchange protocols and their use for building secure channels, Eurocrypt 2001, LNCS 2045, pp. 453-474, (2001)