共 22 条
- [1] Medium access control (MAC) security enhancements, amendment 6 to IEEE standard for information technology - Telecommunications and information exchange between systems-local and metropolitan area networks-specific requirements - Part 11: Wireless medium access control, (2004)
- [2] He C., Mukund S., Datta A., Et al., A modular correctness proof of IEEE 802.11i and TLS, Proc of the 12th ACM Conf on Computer and Communications Security (CCS'05), pp. 2-15, (2005)
- [3] Housley R., Polk W., Ford W., Et al., Internet X. 509 public key infrastructure certificate and certificate revocation list (CRL) profile, (2002)
- [4] Shamir A., Identity-based cryptosystems and signature schemes, LNCS 196: Proc of the Advances in Cryptology-CRYPTO'84, pp. 47-53, (1985)
- [5] Al-Riyami S.S., Paterson K., Certificateless public key cryptography, LNCS 2894: Proc of the Advances in Cryptology-ASIACRYPT'03, pp. 452-473, (2003)
- [6] Lippold G., Boyd C., Nieto J., Strongly secure certificateless key agreement, LNCS 5671: Proc of the Pairing'09, pp. 206-230, (2009)
- [7] Zhang L., Zhang F., Wu Q., Et al., Simulatable certifi-cateless two-party authenticated key agreement protocol, Information Sciences, 180, 2, pp. 1020-1030, (2010)
- [8] Bentahar K., Farshim P., Malone-Lee J., Et al., Generic constructions of identity-based and certificateless KEMs, Journal of Cryptology, 21, 2, pp. 178-199, (2008)
- [9] Dent A.W., A survey of certificateless encryption schemes and security models, International Journal of Information Security, 7, 5, pp. 349-377, (2008)
- [10] Yang G., Tan C.-H., Strongly secure certificateless key exchange without pairing, Proc of the 6th ACM Symp on Information, Computer and Communications Security (AISACCS'11), pp. 71-79, (2011)