共 13 条
- [1] Catalano D., Di Raimondo M., Fiore D., Messina M., Zero-knowledge sets with short proofs, IEEE Trans. Inform. Theory, 57, pp. 2488-2502, (2011)
- [2] Chim T.W., Yiu S.M., Huiand L.C., Li V.O., PASS: Privacy-preserving authentication scheme for smart grid network, Proceedings of the IEEE International Conference On Smart Grid Communications, pp. 196-201, (2011)
- [3] Cho J.H., Swami A., Chen I.R., A survey on trust management for mobile ad hoc networks, IEEE Commnn. Surv. Tutorials, 13, pp. 562-583, (2010)
- [4] Day J.N., Chau T.T.H., Wolbers M., Mai P.P., Dung N.T., Et al., Combination antifungal therapy for cryptococcal meningitis, N. Engl. J. Med, 368, pp. 1291-1302, (2013)
- [5] Gros J., Ostrovsky R., Sahai A., New techniques for noninteractive aero-knowledge, J. ACM, 59, (2012)
- [6] He D., Bu J., Chan S., Chen C., Yin M., Privacy-preserving universal authentication protocol for wireless communications, IEEE Trans. Wireless Commun, 10, pp. 431-436, (2011)
- [7] Kale M.R.A., Gupta S.R., Prmit R.B., An overview of manet ad hoc network, Int. J. Comput. Sci. Appl, 6, pp. 223-227, (2013)
- [8] Li F., Wang Y., Routing in vehicular ad hoc networks: A survey, IEEE Veh. Technol. Mag, 2, pp. 12-22, (2007)
- [9] Othman H., Hashim H., Ab Manan J.L., A Conceptual Framework Providing Direct Anonymous Attestation (DAA) Protocol In Trusted Location-based Services (LBS), Proceedings of the International Conference On Internet Technology and Secured Transactions, (2010)
- [10] Shen Z., Tong Q., The security of cloud computing system enabled by trusted computing technology, Proceedings of the 2nd International Conference On Signal Processing Systems, 2, (2010)