[1] Jiang Yixin, Lin Chuang. Mutual Authentication and Key Exchange Protocols for Roaming Services in Wireless Mobile Networks[J]. IEEE Trans on Wireless Communications, 2006, 5(9): 1-8.
[2] Hwang R J, Li Jingfeng, Hsiao Y K. A Wirelessbased Authentication and Anonymous Channels for GSM System[J]. Journal of Computers, 2006, 17(1): 31-36.
[3] Horn G, Martin K, Mitchel C J. Authentication Protocols for Mobile Network Environment Value-added Services[J]. IEEE Trans on Vehicular Technology, 2002, 51(2): 383-392.
[4] Beller M, Chang L, Yacobi Y. Privacy and Authentication on a Portable Communications System[J]. IEEE J Selected Areas in Comm, 1993, 11(6): 821-829.
[5] 万仁福, 李方伟, 朱江. 匿名双向认证与密钥协商新协议[J]. 电子科技大学学报, 2005, 34(1): 61-64.
Wan Renfu, Li Fangwei, Zhu Jiang. An Efficient Anonymity Mutual Authentication Protocol[J]. Journal of UEST of China, 2005, 34(1): 61-64.
[6] 张跃宇, 李晖, 王育民. 一种基于群签名的安全电子拍卖方案[J]. 西安电子科技大学学报, 2008, 35(4): 614-619.
Zhang Yueyu, Li Hui, Wang Yumin. Secure Electronic Auction Scheme Based on the Group Signature [J]. Journal of Xidian University, 2008, 35(4): 614-619.
[7] 孙纪敏, 孙玉, 张思东, 等. 基于ID的认证及密钥协商协议[J]. 西安电子科技大学学报, 2008, 35(3): 559-562.
Sun Jimin, Sun Yu, Zhang Sidong, et al. Identity (ID)-based Authentication and the Key Agreement Protocol [J]. Journal of Xidian University, 2008, 35(3): 559-562.
[8] Brickell E, Camenisch J, Chen L. Direct Anonymous Attestation[C]//Proc of the 11th ACM Conference on Computer and Communications Security. New York: ACM Press, 2004: 132-145
[9] Camenisch J, Lysyanskaya A. A Signature Scheme with Efficient Protocols[C]//Proc of the Third International Conference on Security in Communication Networks, LNCS 2576. Amalfi: Springer-Verlag, 2003: 268-289.
[10] Fiat A, Shamir A. How to Prove Yourself: Practical Solutions to Identification and Signature Problems[C]//Advances in Cryptology—CRYPTO'86, LNCS 263. Berlin: Springer-Verlag, 1987: 186-194.
[11] Moe R. Overview of the GSM System and Protocol Architecture[J]. IEEE Communications Magazine, 1993, 31(4): 92-100.
[12] 刘景森, 戴冠中. 一种面向付费个性化服务的匿名认证方案[J]. 计算机科学, 2008, 135(14): 248-251.
Liu Jingsen, Dai Guanzhong. An Anonymous Authentication Method for Toll Personalized Service[J]. Computer Science, 2008, 135(14): 248-251.
[13] 党岚君, 寇卫东, 曹雪菲, 等. 具有用户匿名性的移动IP注册协议[J]. 西安电子科技大学学报, 2008, 35(2):282-287.
Dang Lanjun, Kou Weidong, Cao Xuefei, et al. Mobile IP Registration Protocol with User Anonymity [J]. Journal of Xidian University, 2008, 35(2): 282-287.
[14] 韩卫占, 张思东, 孙玉. 通信网网络管理控制系统可靠性及其评价研究[J]. 西安电子科技大学学报, 2008, 35(1):133-139.
Han Weizhan, Zhang Sidong, Sun Yu. Research on and Evaluation of the Reliability of a Communication Network Management and Control System [J]. Journal of Xidian University, 2008, 35(1): 133-139.
[15] Shields C,Levine B.A Protocol for Anonymous Communication Over the Internet[C]//Proc of the 7th ACM Conference on Computer and Communication Security. Athens: ACM Press, 2000:33-42.
[16] 李龙海,肖国镇. 具有可撤销匿名性的混合网[J].西安电子科技大学学报,2008,35(4): 639-644.
Li Longhai, Xiao Guozhen. Mix Net with Revocable Anonymity [J]. Journal of Xidian University, 2008, 35(4):639-644.
[17] 见晓春,吴振强,王晓明,等. 移动互联网络动态匿名算法设计与分析[J]. 计算机工程与应用, 2009, 45(18): 115-119.
Jian Xiaochun, Wu Zhenqiang, Wang Xiaoming, et al. Design and Analysis of Dynamic Anonymity Algorithm in Mobile Internet[J]. Computer Engineering and Applications, 2009, 45(18):115-119. |