舒剑,许春香.改进的基于身份认证密钥协商协议[J].计算机应用研究,2010,65(1):218-219SHU Jian,XU Chun-xiang.Improve ment of ID-basedauthenticated key exchange protocol[J].ApplicationResearch of Computers,2010,65(1):218-219.(inChinese)
[4]
任勇军,王建东,王箭,等.标准模型下基于身份认证密钥协商协议[J].计算机研究与发展,2010,47(9):1604-1610.REN Yong-jun,WANG Jian-dong,WANG Jian,et al.Identity-based authenticated key agreement protocols in thestandard model[J].Journal of Computer Research andDevelopment,2010,47(9):1604-1610.(in Chinese)
[5]
郭华,张帆,李舟军,等.对一个基于身份的密钥协商协议的分析与改进[J].计算机科学,2010,37(10):78-81.GUO Hua,ZHANG Fan,LI Zhou-jun,et al.Cryptanalysis and improvement of a new identity-based keyexchange protocol[J].Computer Science,2010,37(10):78-81.(in Chinese)
[6]
BOYD C,PARK D G.Public key protocols for wirelesscommunications[C]∥Proceedings of the ICISC 1998.Seoul:KIISC,1998:47-57.
[7]
SHOUP V.On formal models for secure key exchange[EB/OL].[2011-05-15].http:∥www.shoup.net/paper/skey.ps.
[8]
查俊,苏锦海,张学润.一个新的基于口令的密钥协商协议[J].计算机应用研究,2010,27(10):3885-3888.ZHA Jun,SU Jin-hai,ZHANG Xue-run.New keyagreement protocol based on passwords[J].ApplicationResearch of Comptuers,2010,27(10):3885-3888.(inChinese)
[9]
VIET D Q,YAMAMURA A,TANAKA H.Anonymouspassword-based authenticated key exchange[C]∥Proceedings of INDOCRYPT.Berlin:Springer-Verlag,2005:244-257.
[10]
CHAI Z C,CAO Z F,LU R X.Efficient password-basedauthentication and key exchange scheme preserving userprivacy[C]∥WASA 2006.Heidelberg:Springer-Verlag,2006:467-477.
[11]
CHOW S S M,CHOO K K R.Strongly-secure identity-based key agreement and anonymous extension[C]∥Proceedings of Information Security Conference(ISC2007).Berlin:Springer-Verlag,2007:203-220.
[12]
胡焰智,马大玮,田增山.一种匿名认证密钥协商协议[J].计算机应用研究,2009,26(8):3024-3027.HU Yan-zhi,MA Da-wei,TIAN Zeng-shan.Authenticated key agreement protocol with anonymity[J].Application Research of Computers,2009,26(8):3024-3027.(in Chinese)
[13]
冯登国,秦宇,汪丹,等.可信计算技术研究[J].计算机研究与发展,2011,48(8):1332-1349.FENG Deng-guo,QIN Yu,WANG Dan,et al.Researchon trusted computing technology[J].Journal of ComputerResearch and Development,2011,48(8):1332-1349.(in Chinese)
[14]
刘安战,韩玉民.可信平台模块数据保护能力测试与分析[J].计算机应用,2010,30(5):1243-1245.LIU An-zhan,HAN Yu-min.Test and analysis of trustedplatform module data protection[J].Journal of ComputerApplication,2010,30(5):1243-1245.(in Chinese)