刁俊峰. 软件安全中的若干关键技术研究. 北京: 北京邮电大学, 2007: 41-55. Diao Jun-feng. Research on some key technologies of software security. Beijing: Beijing University of Posts and Telecommunications, 2007: 41-55.
[2]
袁征, 温巧燕, 陈瑞利, 等. ID口令进化的Ad Hoc网络会话密钥方案[J]. 北京邮电大学学报, 2007, 30(5): 82-85. Yuan Zheng, Wen Qiaoyan, Chen Ruili, et al. Conversation keys scheme bases ID and evolved passwords in Ad hoc network[J]. Journal of Beijing University of Posts and Telecommunications, 2007, 30(5): 82-85.
[3]
Microsoft. Remote desktop protocol (RDP) features and performance white paper. .
[4]
Zhou Lan, Susilo W, Mu Y. Efficient ID-based authenticated group key agreement from bilinear pairings//MSN 2006. Berlin: Springer-LNCS, 2006: 521-532.
[5]
Bellare M, Pointcheval D, Rogaway P. Authenticated key exchange secure against dictionary attacks//EUROCRYPT 2000. Berlin: Springer-LNCS, 2000: 139-154.
[6]
Bresson E, Chevassut O, Pointcheval D. Cryptography for secure dynamic group communication: US,20050157874. 2004-11-30.
[7]
Bellovin S M, Merritt M. Cryptographic protocol for secure communications: US,5241599. 1993-8-31.
[8]
Bellovin S M, Merritt M. A cryptographic protocol for secure communications: European 05 35863B1. 2002-01-23. http://www.free patentsonline.com/EP0535863B1.html.
[9]
Jablon D. Cryptographic methods for remote authentication: US,6226383. 2001-05-01.
[10]
Wu Thomas J. System and method for securely logging onto a remotely located computer: US,653 9479. 2003-03-25.