[1] Trust Computing Group.TPM main part 1:design principles specification,version 1.2 revision 62[S].Geneva:International Organization for Standardization (IOS),2009. [2] Trust Computing Group.TCG trusted network connect architecture for interoperability specification version 1.4[EB/OL].(2009-05-18)[20015-11-18].http://www.trustedcomputinggroup.org. [3] Trust Computing Group.Architect's guide:mobile security using TNC technology[EB/OL].(2011-12-29)[2015-10-18].http://www.trustedcomputinggroup.org/developers/mobile. [4] 马卓,马建峰,李兴华,等.可证明安全的可信网络连接协议模型[J].计算机学报,2011,34(9):1669-1678.(MA Z,MA J F,LI X H,et al.Provable security model for trusted network connect protocol[J].Chinese Journal of Computers,2011,34(9):1669-1678.) [5] 吴振强,周彦伟,乔子芮.移动互联网下可信移动平台接入机制[J].通信学报,2011,31(10):158-169.(WU Z Q,ZHOU Y W,QIAO Z R.Access mechanism of TMP under mobile network[J].Journal on Communications,2011,31(10):158-169.) [6] 马卓,张俊伟,马建峰,等.可证明安全的无双线性对无证书可信接入认证协议[J].计算机研究与发展,2014,51(2):325-333.(MA Z,ZHANG J W,MA J F,et al.Provably secure certificateless trusted access protocol for WLAN without pairing[J].Journal of Computer Research and Development,2014,51(2):325-333.) [7] 杨力,马建峰,朱建明.可信的匿名无线认证协议[J].通信学报,2009,30(9):29-35.(YANG L,MA J F,ZHU J M.Trusted and anonymous authentication scheme for wireless networks[J].Journal on Communications,2009,30(9):29-35.) [8] 周彦伟,杨波,张文政.可证安全的移动互联网可信匿名漫游协议[J].计算机学报,2015,38(4):733-748.(ZHOU Y W,YANG B,ZHANG W Z.Provable secure trusted and anonymous roaming protocol for mobile Internet[J].Chinese Journal of Computers,2015,38(4):733-748.) [9] RAYA M,HUBAUX J-P.Securing vehicular Ad Hoc networks[J].Journal of Computer Security-Special Issue on Security of Ad-hoc and Sensor Networks,2007,15(1):39-68. [10] 侯惠芳,季新生,刘光强.异构无线网络中基于标识的匿名认证协议[J].通信学报,2011,32(5):153-161.(HOU H F,JI X S,LIU G Q.Identity-based anonymity authentication protocol in the heterogeneous wireless network[J].Journal on Communications,2011,32(5):153-161.) [11] 侯惠芳,刘光强,季新生,等.基于公钥的可证明安全的异构无线网络认证方案[J].电子与信息学报,2009,31(10):2385-2391.(HOU H F,LIU G Q,JI X S,et al.Provable security authentication scheme based on public key for heterogeneous wireless network[J].Journal of Electronics&Information Technology,2009,31(10):2385-2391.4) [12] YANG G,HUANG Q,WONG D S,et al.Universal authentication protocols for anonymous wireless communications[J].IEEE Transactions on Wireless Communications,2010,9(1):168-174. |