共 23 条
- [1] Buchanan K.(1997)IMT-2000: Service provider' perspective IEEE Personal Communications Magazine 4 8-13
- [2] Fudge R.(1990)A logic of authentication ACM Transactions on Computer Systems 8 18-36
- [3] McFarlane D.(1994)Toward a national public key infrastructure IEEE Communications Magazine 32 70-74
- [4] Phillips T.(1995)A forwarding strategy to reduce network impacts of PCS IEEE INFOCOM 2 481-489
- [5] Sasaki A.(1994)A caching strategy to reduce network impacts of PCS IEEE Journal on Selected Areas in Communications 12 1434-1444
- [6] Xia H.(1993)Privacy enhancement for Internet electronic mail, Part II: Certificate-based key management RFC 1422 20-25
- [7] Burrows M.(1996)Role-based access control models IEEE Computer 292 38-47
- [8] Abadi M.(1978)A method for obtaining digital signatures and public-key cryptosystems Communications of the ACM 21 120-126
- [9] Needham R.(undefined)undefined undefined undefined undefined-undefined
- [10] Chokhani S.(undefined)undefined undefined undefined undefined-undefined