1 |
袁驰.基于身份的动态层簇式无线传感网络认证算法[J].计算机应用, 2020, 40(11): 3236-3241. 10.11772/j.issn.1001-9081.2020030400
|
|
YUAN C. Identity-based dynamic clustering authentication algorithm for wireless sensor networks[J]. Journal of Computer Applications, 2020, 40(11): 3236-3241. 10.11772/j.issn.1001-9081.2020030400
|
2 |
WANG J, CAO Y Q, LI B, et al. Particle swarm optimization based clustering algorithm with mobile sink for WSNs[J]. Future Generations Computer Systems, 2017, 76: 452-457. 10.1016/j.future.2016.08.004
|
3 |
BUTTYAN L, GESSNER D, HESSLER A, et al. Application of wireless sensor networks in critical infrastructure protection: challenges and design options [J]. IEEE Wireless Communications, 2010, 17(5): 44-49. 10.1109/mwc.2010.5601957
|
4 |
任志玲,张广全,林冬,等.无线传感器网络应用综述[J].传感器与微系统, 2018, 37(3): 1-2, 10.
|
|
REN Z L, ZHANG G Q, LIN D, et al. Review on application of WSNs[J]. Transducer and Microsystem Technologies, 2018, 37(3): 1-2, 10.
|
5 |
谢英英,石涧,黄硕康,等.面向5G的命名数据网络物联网研究综述[J].计算机科学, 2020, 47(4): 217-225. 10.11896/jsjkx.191000157
|
|
XIE Y Y, SHI J, HUANG S K, et al. Survey on Internet of Things based on named data networking facing 5G[J]. Computer Science, 2020, 47(4): 217-225. 10.11896/jsjkx.191000157
|
6 |
MAITI P, SHUKLA J, SAHOO B, et al. Efficient data collection for IoT services in edge computing environment [C]// Proceedings of the 2017 International Conference on Information Technology. Piscataway: IEEE, 2017: 101-106. 10.1109/icit.2017.40
|
7 |
XIONG J B, CHEN L, BHUIYAN M Z A, et al. A secure data deletion scheme for IoT devices through key derivation encryption and data analysis[J]. Future Generation Computer Systems, 2020, 111: 741-753. 10.1016/j.future.2019.10.017
|
8 |
张远方.分层无线传感网络用户认证技术研究[D].南京:东南大学, 2016: 26-35. 10.21629/jsee.2017.01.19
|
|
ZHANG Y F. Research on user authentication technology in hierarchical wireless sensor network[D]. Nanjing: Southeast University, 2016: 26-35. 10.21629/jsee.2017.01.19
|
9 |
王辉,刘玉祥,曹顺湘,等.融入区块链技术的医疗数据存储机制[J].计算机科学, 2020, 47(4): 285-291. 10.11896/jsjkx.190400001
|
|
WANG H, LIU Y X, CAO S X, et al. Medical data storage mechanism integrating blockchain technology[J]. Computer Science, 2020, 47(4): 285-291. 10.11896/jsjkx.190400001
|
10 |
KIM T H, GOYAT R, RAI M K, et al. A novel trust evaluation process for secure localization using a decentralized blockchain in wireless sensor networks[J]. IEEE Access, 2019, 7: 184133-184144. 10.1109/access.2019.2960609
|
11 |
周致成,李立新,李作辉.基于区块链技术的高效跨域认证方案[J].计算机应用, 2018, 38(2): 316-320, 326.
|
|
ZHOU Z C, LI L X, LI Z H. Efficient cross-domain authentication scheme based on blockchain technology[J]. Journal of Computer Applications, 2018, 38(2): 316-320, 326.
|
12 |
西门子公司.防篡改地建立密钥的方法和系统:中国, 200780014690.4[P]. 2007-05-06. 10.17265/1537-1506/2007.05
|
|
SIEMENS. Method and system for the manipulation protected generation of a cryptographic key: China, 200780014690.4[P]. 2007-05-06. 10.17265/1537-1506/2007.05
|
13 |
付烁,徐海霞,李佩丽,等.数字货币的匿名性研究[J].计算机学报, 2019, 42(5): 1045-1062.
|
|
FU S, XU H X, LI P L, et al. A survey on anonymity of digital currency[J]. Chinese Journal of Computers, 2019, 42(5): 1045-1062.
|
14 |
PUTHAL D, MALIK N, MOHANTY S P, et al. The blockchain as a decentralized security framework [J]. IEEE Consumer Electronics Magazine, 2018, 7(2): 18-21. 10.1109/mce.2017.2776459
|
15 |
汪和平.椭圆曲线加密IP核的设计与实现[D].哈尔滨:哈尔滨工业大学, 2012: 19-27.
|
|
WANG H P. Design and implementation of elliptic curve encryption IP core[D]. Harbin: Harbin Institute of Technology, 2012: 19-27.
|
16 |
赵梁,李磊,李向丽.基于双序列函数的重放攻击防御方案[J].计算机工程, 2020, 46(9): 143-148.
|
|
ZHAO L, LI L, LI X L. Replay attack defense scheme based on double sequence function[J]. Computer Engineering, 2020, 46(9): 143-148.
|
17 |
陈华,习伟,范丽敏,等.密码产品的侧信道分析与评估[J].电子与信息学报, 2020, 42(8): 1836-1845. 10.11999/JEIT190853
|
|
CHEN H, XI W, FAN L M, et al. Side channel analysis and evaluation on cryptographic products[J]. Journal of Electronics and Information Technology, 2020, 42(8): 1836-1845. 10.11999/JEIT190853
|
18 |
BALA S, SHARMA G, VERMA A K. Impersonation attack on CertificateLess key agreement protocol[J]. International Journal of Ad Hoc and Ubiquitous Computing, 2018, 27(2): 108-120. 10.1504/ijahuc.2018.089580
|
19 |
CHEN X H, MIZERA A, PANG J. Activity tracking: a new attack on location privacy [C]// Proceedings of the 2015 IEEE Conference on Communications and Network Security. Piscataway: IEEE, 2015: 22-30. 10.1109/cns.2015.7346806
|