共 24 条
[2]
Arkko J., 2004, 3830 RFC INT ENG
[3]
Server Assisted Key Establishment Protocol for WSN: a MIKEY-Ticket approach
[J].
2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013),
2013,
:94-101
[4]
Brown D., 2009, Released Standard Version 1
[5]
Brown D. R. L., 2010, SEC 2: Recommended Elliptic Curve Domain Parameters
[6]
Brown D. R. L., 2007, IN PRESS
[7]
Dae Hyun Yum, 2002, Information Security and Cryptology - ICISC 2001. 4th International Conference. Proceedings (Lecture Notes in Computer Science Vol.2288), P305
[8]
Dang Q., 2008, Recommendation for Applications Using Approved Hash Algorithms
[9]
Dunkels A, 2004, CONF LOCAL COMPUT NE, P455
[10]
Dunkels A., 2007, P 4 WORKSH EMB NETW, P28, DOI DOI 10.1145/1278972.1278979