1 |
陈华平,北京博文广成信息安全技术有限公司. 基于标识的证书认证体制CFL: 201110250009.4[P]. 2013-03-06. 10.4236/jis.2015.63020
|
|
CHEN H P, Beijing Bowen Guangcheng Information Security Technology Co. Ltd. Identification based certificate authentication system CFL: 201110250009.4[P]. 2013-03-06. 10.4236/jis.2015.63020
|
2 |
RAO N, SRIVASTAVA S, SREEKANTH K S. PKI deployment challenges and recommendations for ICS networks[J]. International Journal of Information Security and Privacy, 2017, 11(2): 38-48. 10.4018/ijisp.2017040104
|
3 |
魏珊珊,韩庆敏,郭肖旺,等. 基于国密算法的PKI在工控系统中的应用研究[J]. 计算机与现代化, 2018(11):1-6. 10.3969/j.issn.1006-2475.2018.11.001
|
|
WEI S S, HAN Q M, GUO X W, et al. Research on Application of PKI based on nation secret algorithm in ICS[J]. Computer and Modernization, 2018(11): 1-6. 10.3969/j.issn.1006-2475.2018.11.001
|
4 |
许峰,齐玉国,黄皓,等. 基于开放源码的企业自建CA系统的研究与实现[J]. 计算机工程, 2006, 32(5):128-130. 10.3969/j.issn.1000-3428.2006.05.046
|
|
XU F, QI Y G, HUANG H, et al. Research and implementation of private enterprise CA based on open source code[J]. Computer Engineering, 2006, 32(5): 128-130. 10.3969/j.issn.1000-3428.2006.05.046
|
5 |
BONEH D, FRANKLIN M. Identity-based encryption from the Weil pairing[J]. SIAM Journal on Computing, 2003, 32(3): 586-615. 10.1137/s0097539701398521
|
6 |
WATERS B. Efficient identity-based encryption without random oracles[C]// Proceedings of the 2005 Annual International Conference on the Theory and Applications of Cryptographic Techniques, LNCS 3494. Berlin: Springer, 2005: 114-127.
|
7 |
GENTRY C, PEIKERT C, VAIKUNTANATHAN V. Trapdoors for hard lattices and new cryptographic constructions[C]// Proceedings of the 40th Annual ACM Symposium on Theory of Computing. New York: ACM, 2008: 197-206. 10.1145/1374376.1374407
|
8 |
SARVABHATLA M, VORUGUNTI C S. A secure and robust dynamic ID-based mutual authentication scheme with smart card using elliptic curve cryptography[C]// Proceedings of the 7th International Workshop on Signal Design and Its Applications in Communications. Piscataway: IEEE, 2015: 75-79. 10.1109/iwsda.2015.7458418
|
9 |
KIM S Y, KIM H, LEE D H. An efficient ID-based mutual authentication secure against privileged-insider attack[C]// Proceedings of the 5th International Conference on IT Convergence and Security. Piscataway: IEEE, 2015:1-4. 10.1109/icitcs.2015.7292941
|
10 |
LINDELL Y. Fast secure two-party ECDSA signing[C]// Proceedings of the 2017 Annual International Cryptology Conference, LNCS 10402. Cham: Springer, 2017: 613-644.
|
11 |
DOERNER J, KONDI Y, LEE E, et al. Secure two-party threshold ECDSA from ECDSA assumptions[C]// Proceedings of the 2018 IEEE Symposium on Security and Privacy. Piscataway: IEEE, 2018: 980-997. 10.1109/sp.2018.00036
|
12 |
CASTAGNOS G, CATALANO D, LAGUILLAUMIE F, et al. Two-party ECDSA from hash proof systems and efficient instantiations[C]// Proceedings of the 2019 Annual International Cryptology Conference, LNCS 11694. Cham: Springer, 2019: 191-221.
|
13 |
闫少勃. 国产化PLC上下位机安全通信技术研究[D]. 西安:西安电子科技大学, 2017: 2-16.
|
|
YAN S B. Research on the secure communication technology of the upper and lower computer in domestic PLC[D]. Xi’an: Xidian University, 2017: 2-16.
|
14 |
惠敦炎. PROFIsafe: PROFIBUS和PROFINET的安全通信技术[J].自动化博览, 2012, 29(S1): 47-48.
|
|
HUI D Y. PROFIsafe: safe communication technology for PROFIBUS and PROFINET[J]. Automation Panorama, 2012, 29(S1): 47-48.
|
15 |
CANVEL B, HILTGEN A, VAUDENAY S,et al. Password interception in a SSL/TLS channel[C]// Proceedings of the 2003 Annual International Cryptology Conference,LNCS 2729.Berlin: Springer, 2003: 583-599.
|
16 |
廉文娟,赵朵朵,范修斌. 基于CFL_BLP模型的CFL SSL安全通信协议[J]. 计算机工程, 2021, 47(6):152-163.
|
|
LIAN W J, ZHAO D D, FAN X B. CFL SSL secure communication protocol based on CFL_BLP model[J]. Computer Engineering, 2021, 47(6):152-163.
|
17 |
全国信息安全标准化技术委员会. 信息安全技术 SM2椭圆曲线公钥密码算法 第4部分:公钥加密算法: [S]. 北京: 中国标准出版社, 2016:2-6.
|
|
National Information Technology Standardization Technical Committee. Information security technology - public key cryptographic algorithm SM2 based on elliptic curves - part 4: public key encryption algorithm: [S]. Beijing: Standards Press of China, 2016: 2-6.
|
18 |
全国信息安全标准化技术委员会. 信息安全技术 SM4分组密码算法: [S]. 北京: 中国标准出版社, 2016:1-12.
|
|
National Information Technology Standardization Technical Committee. Information security technology - SM4 block cipher algorithm: [S]. Beijing: Standards Press of China, 2016:1-12.
|
19 |
ONIGA B, FARR S H, MUNTEANU A, et al. IoT infrastructure secured by TLS level authentication and PKI identity system[C]// Proceedings of the 2nd World Conference on Smart Trends in Systems, Security and Sustainability. Piscataway: IEEE, 2018:78-83. 10.1109/worlds4.2018.8611563
|
20 |
Chengdu Huawei Symantec Technologies Co., Ltd. Method, system, and device for obtaining keys: US 8769287B2[P]. 2014-07-01.
|
21 |
KILINC H H, YANIK T. A survey of SIP authentication and key agreement schemes[J]. IEEE Communications Surveys and Tutorials, 2014, 16(2):1005-1023. 10.1109/surv.2013.091513.00050
|