共 39 条
[21]
MERKLE RC, 1988, LECT NOTES COMPUT SC, V293, P369
[23]
USE OF ELLIPTIC-CURVES IN CRYPTOGRAPHY
[J].
LECTURE NOTES IN COMPUTER SCIENCE,
1986, 218
:417-426
[24]
Mittra S., 1997, Computer Communication Review, V27, P277, DOI 10.1145/263109.263179
[25]
Nakamoto S., 2008, BITCOIN PEER TO PEER
[28]
Roetteler Martin, 2017, Advances in Cryptology - ASIACRYPT 2017. 23rd International Conference on the Theory and Applications of Cryptology and Information Security. Proceedings: LNCS 10625, P241, DOI 10.1007/978-3-319-70697-9_9
[29]
Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2018, 78
:680-698
[30]
Improved group key management region based cluster protocol in cloud
[J].
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS,
2019, 22 (Suppl 5)
:11699-11711