共 33 条
- [1] An-Ni Shen, 2012, 2012 IEEE Wireless Communications and Networking Conference (WCNC), P2543, DOI 10.1109/WCNC.2012.6214227
- [2] [Anonymous], 2005, Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN'05
- [3] [Anonymous], 2006, IEEE STD 16092 2006, DOI DOI 10.1109/IEEESTD.2006
- [4] [Anonymous], EFFICIENT IMPLEMENTA
- [5] [Anonymous], GLOB TEL C 2008 IEEE
- [6] Ashwini N. H., 2014, INT J COMPUT TECHNOL, V1, P162
- [7] Boneh D, 2003, LECT NOTES COMPUT SC, V2656, P416
- [8] Identity-based encryption from the Weil pairing [J]. SIAM JOURNAL ON COMPUTING, 2003, 32 (03) : 586 - 615
- [9] Calandriello G, 2007, VANET'07: PROCEEDINGS OF THE FOURTH ACM INTERNATIONAL WORKSHOP ON VEHICULAR AD HOC NETWORKS, P19
- [10] Chen Q., 80211 IEEE