共 22 条
- [1] [Anonymous], 2016, IEEE T DEPENDABLE SE
- [2] Armando A, 2005, LECT NOTES COMPUT SC, V3576, P281
- [3] Design of an Anonymity-Preserving Group Formation Based Authentication Protocol in Global Mobility Networks [J]. IEEE ACCESS, 2018, 6 : 20673 - 20693
- [4] Basin D., 2005, Int. J. Inf. Secur., V4, P181, DOI [10.1007/s10207-004-0055-7, DOI 10.1007/S10207-004-0055-7]
- [5] Boyd Colin., 2013, PROTOCOLS AUTHENTICA
- [6] ON THE SECURITY OF PUBLIC KEY PROTOCOLS [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) : 198 - 208
- [7] KOBLITZ N, 1987, MATH COMPUT, V48, P203, DOI 10.1090/S0025-5718-1987-0866109-5
- [8] Kocher P., 1999, Advances in Cryptology - CRYPTO'99. 19th Annual International Cryptology Conference. Proceedings, P388
- [9] The advantages of elliptic curve cryptography for wireless security [J]. IEEE WIRELESS COMMUNICATIONS, 2004, 11 (01): : 62 - 67