[1] |
ZEADALLY S, HUNT R, CHEN Y S, et al. Vehicular Ad Hoc Networks (VANETs):Status,Results,and Challenges[J]. Telecommunication Systems, 2012,50(4):217-241.
doi: 10.1007/s11235-010-9400-5
|
[2] |
ZHANG L, WU Q, SOLANAS A, et al. A Scalable Robust Authentication Protocol for Secure Vehicular Communications[J]. IEEE Transactions on Vehicular Technology, 2010,59(4):1606-1617.
|
[3] |
HE D, ZEADALLY S, XU B, et al. An Efficient Identity-based Conditional Privacy-preserving Authentication Scheme for Vehicular Ad Hoc Networks[J]. IEEE Transactions on Information Forensics and Security, 2015,10(12):2681-2691.
|
[4] |
YING B, NAYAK A. Anonymous and Lightweight Authentication for Secure Vehicular Networks[J]. IEEE Transactions on Vehicular Technology, 2017,66(12):10626-10636.
|
[5] |
WANG F, XU Y, ZHANG H, et al. 2FLIP:a Two-factor Lightweight Privacy-preserving Authentication Scheme for VANET[J]. IEEE Transactions on Vehicular Technology, 2016,65(2):896-911.
|
[6] |
YING B, NAYAK A. Anonymous and Lightweight Authentication for Secure Vehicular Networks[J]. IEEE Transactions on Vehicular Technology, 2017,66(12):10626-10636.
|
[7] |
TAN H, XUAN S, CHUNGI.HCDA:Efficient Pairing-free Homographic Key Management for Dynamic Cross-domain Authentication in VANETs[J]. Symmetry, 2020,12(6):1-27.
|
[8] |
CHEN L, LIM H W, YANG G. Cross-domain Password-based Authenticated Key Exchange Revisited [C]// Proceedings of the 2013 IEEE INFOCOM.Piscataway:IEEE, 2013: 1052-1060.
|
[9] |
SHENM, LIU H, ZHU L, et al. Blockchain-assisted Secure Device Authentication for Cross-domain Industrial IoT[J]. IEEE Journal on Selected Areas in Communications, 2020,38(5):942-954.
|
[10] |
JIA X, HU N, SU S, et al. IRBA:an Identity-based Cross-domain Authentication Scheme for the Internet of Things[J]. Electronics, 2020,9(4):634
|
[11] |
周致成, 李立新, 郭松, 等. 基于区块链技术的生物特征和口令双因子跨域认证方案[J]. 计算机应用, 2018,38(6):1620-1627.
|
|
ZHOU Zhicheng, LI Lixin, GUO Song, et al. Biometric and Password Two-Factor Cross Domain Authentication Scheme Based On Blockchain Technology[J]. Journal of Computer Applications, 2018,38(6):1620-1627.
|
[12] |
宁炳钦, 邓伦治. 基于身份的两方跨域认证密钥协商协议[J]. 贵州师范大学学报. 2020,38(2):92-100.
|
|
NING Bingqin, DENG Lunzhi. Identity-based Two-party Cross-domain Authentication Key Agreement Protocol[J]. Journal of Guizhou Normal University, 2020,38(2):92-100.
|
[13] |
LIU Q, GONG B, NING Z. Research on CLPKC-IDPKC Cross-domain Identity Authentication For IoT Environment[J]. Computer Communications, 2020,157:410-416.
|
[14] |
HE D, KUMAR N, WANG H, et al. A Provably-secure Cross-domain Handshake Scheme with Symptoms-matching for Mobile Healthcare Social Network[J]. IEEE Transactions on Dependable and Secure Computing, 2018,15(4):633-645.
|
[15] |
BELLARE M, POINTCHEVAL D, ROGAWAY P. Authenticated Key Exchange Secure against Dictionary Attack [C]//Lecture Notes in Computer Science:1807.Heidelberg:Springer Verlag, 2000: 139-155.
|