共 15 条
[1]
Li H., Sun S., Yang H., Identity-based authentication protocol for grid-based anufacturing, Computer Integrated Manufacturing Systems, 14, 1, pp. 177-182, (2008)
[2]
Zhang Y., Wang H., Key technologies and system implementation of distributed collaborative product design & manufacturing, Engineering Design, 9, 2, pp. 149-155, (2005)
[3]
Ren J., Li J., Research on security architecture in networked manufacturing system, Manufacturing Automation, 32, 8, pp. 185-187, (2010)
[4]
Hess F., Efficient identity-based signature schemes based on pairings, Proceedings of the 9th Annual International Workshop on Selected Areas in Cryptography, (2003)
[5]
Lei Z., Design secure file transmission system in networked manufacturing based on chaos, Microelectronics & Computer, 29, 4, pp. 198-122, (2012)
[6]
Lu R., Lin X., Cao Z., Et al., New(t, n)threshold directed signature scheme with provable security, Information Sciences, 178, 3, pp. 756-765, (2008)
[7]
Chen X., Site security risks and preventive measures, Coal Technology, 30, 1, pp. 112-114, (2011)
[8]
Kim T., Christopher D., Cera C., Multi-level modeling and access control for data sharing in collaborative ddsign, Advanced Engineering Informatics, 20, 1, pp. 47-57, (2006)
[9]
Song W., Liu W., Sun D., Security system design & its implementation for collaborative supply chain, Computer Integrated Manufacturing Systems, 12, 2, pp. 292-296, (2006)
[10]
Liu M., Yan J., Wang J., Collaboration-oriented security architecture & technologies in grid-based manufacturing pattern, Computer Integrated Manufacturing Systems, 12, 3, pp. 458-464, (2006)