共 26 条
- [11] Hankerson D., 2003, Guide to Elliptic Curve Cryptography
- [12] Hill J, 2000, ACM SIGPLAN NOTICES, V35, P93, DOI 10.1145/384264.379006
- [13] Hu LX, 2003, 2003 SYMPOSIUM ON APPLICATIONS AND THE INTERNET WORKSHOPS, PROCEEDINGS, P384, DOI 10.1109/SAINTW.2003.1210191
- [14] KOBLITZ N, 1987, MATH COMPUT, V48, P203, DOI 10.1090/S0025-5718-1987-0866109-5
- [15] Levis P, 2005, AMBIENT INTELLIGENCE, P115
- [16] A public-key infrastructure for key i)istribution in TinyOS based on elliptic curve cryptography [J]. 2004 FIRST ANNUAL IEEE COMMUNICATIONS SOCIETY CONFERENCE ON SENSOR AND AD HOC COMMUNICATIONS AND NETWORKS, 2004, : 71 - 80
- [17] Mlaih E., 2008, P IEEE INFOCOM WORKS, P1, DOI DOI 10.1109/INFOCOM.2008.4544601
- [18] Mykletun E, 2006, IEEE ICC, P2288
- [20] Parmar K., 2015, J. Inf. Secur, V6, P38