Hu Yan,Dong Mingchui.Strengthening the security of network applications with SSL protocol[J].Automation of Electric Power Systems,2002,26(15):70-77(in Chinese).
[3]
邱治国.一类SSL加密算法的攻击[D].济南:山东大学,2007.
[4]
Kim M,Kim K.A new identification scheme based on the bilinear Diffie-Hellman group[C]//7th Australasian Conference on Information Security and Privacy,ACISP 2002.Melboume,Australia:Deakin University and iCORE,Alberta,Canada and the Australian Computer Society,2002:362-378.
Sui A,Hui L,Yiu S,et al.An improved authenticated key agreement protocol with perfect forward secrecy for wireless mobile communication[C]//IEEE Wireless and Communications and Networking Conference,WCNC 2005.New ORLEANS,LA USA:IEEE Communications Society,2005:88-93.
Zhao Bing,Gao Xin,Gao Panpan,et al.A lightweight authenticated protocol with key agreement for power utilization information collecting[J].Automation of Electric Power Systems,2013,37(10):10-16(in Chinese).
Yang Yin,Guan Jihong,Tian Tao.A CPU card solution based on the SM1 cryptographic algorithm for multi-applications[J].Computer Science,2011,1:16-26(in Chinese).
[12]
薛锐.冯登国.安全协议的形式化分析技术与方法[J].计算机学报,2006,29(1):1-20.
[13]
Xue Rui,Feng Dengguo.The approaches and technologies for formal verification of security protocols[J].Chinese Journal of Computers,2006,29(1):1-20(in Chinese).
[14]
GaoLijun,Ma Maode,Shu Yantai,et al.A security protocol resistant to intermittent position trace attacks and desynchronization attacks in RFID systems[J].Wireless Personal Communications,2013,68(4):1943-1959.
[15]
Peris-Lopez,Hernandez-Castro P,Tapiador J C,et al.Advances in ultralightweight cryptography for low-cost RFID tags:Gossamer protocol[C]//9th International workshop,WISA 2008.Jeju Island,Korea:University Trier,2008:23-25.
[16]
Sun Hung-Min,Ting Wei-Chih,Wang King-Hang.On the security of Chien’s ultralightweight RFID authentication protocol[J].IEEE Transactions on Dependable and Secure Computing,2011,2(8):315-317.
Yang Chengyue.Power grid emergency command system based on internet of things and spatial information technologies[J].Power System Technology,2013,37(6):1632-1638(in Chinese).
Lu Baohui,Ma Yonghong.Research on communication system of advanced metering infrastructure for smart grid and its data security measures[J].Power System Technology,2013,37(8):2244-2249(in Chinese).
Zhu Zheng,Gu Zhongjian,Wu Jinlong,et al.Application of cloud computing in electric power system data recovery[J].Power System Technology,2012,36(9):44-50(in Chinese).
Song Xinli,Tang Yong,Bu Guangquan,et al.Full dynamic simulation for the stability analysis of large power system[J].Power System Technology,2008,32(22):23-28(in Chinese).
XuRuzhi,Wang Yufei.A study on electric power information network-oriented security situation awareness[J].Power System Technology,2013,37(1):53-57(in Chinese).