共 30 条
[1]
Ali M, 2016, PROCEEDINGS OF USENIX ATC '16: 2016 USENIX ANNUAL TECHNICAL CONFERENCE, P181
[2]
Avellaneda O, 2019, IEEE Communications Standards Magazine, V3, P10, DOI [10.1109/mcomstd.2019.9031542, 10.1109/MCOMSTD.2019.9031542, DOI 10.1109/MCOMSTD.2019.9031542]
[3]
Axon L., 2016, 14 INT C SEC CRYPT S, V6
[6]
Trust Enhancement Scheme for Cross Domain Authentication of PKI system
[J].
2019 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC),
2019,
:103-110
[7]
Cheng Yage, 2019, Journal of Computer Applications, V39, P2629, DOI 10.11772/j.issn.1001-9081.2019030513
[8]
Diffie W., 1976, IEEE Transactions on Information Theory, V22, P644, DOI [10.1145/3549993.355000, DOI 10.1145/3549993.355000, DOI 10.1145/3549993.3550007, 10.1145/3549993.3550007]
[9]
Fei C., 2018, White Pap
[10]
Fromknecht C., 2014, Mass. Inst. Technol. Camb. MA, USA, Tech. Rep, V6, P46