李忠献,詹榜华,杨义先.一种基于智能卡的公钥认证方案[J].北京邮电大学学报,1999,22(1):85-87.LI Zhong-xian,ZHAN Bang-hua,YANG Yi-xian.Key authentication scheme based on smart cards[J].Journal of BeijingUniversity of Posts and Telecommunications,1999,22(1):85-87.(in Chinese)
李凯,杨放春.一种适合NGN的鉴别业务框架的研究[J].北京邮电大学学报,2005,28(1):83-87.LI Kai,YANG Fang-chun.The study of a NGN's authentication service framework[J].Journal of Beijing University of Postsand Telecommunications,2005,28(1):83-87.(in Chinese)
[4]
REN Kui,LOU Wen-jing,KIM Kwang-jo,et al.A novel privacy preserving authentication and access control scheme forpervasive computing environments[J].IEEE Transactions on Vehicular Technology,2006,55(4):1373-1384.
[5]
HORNG,MARTINKM,MITCHELLC J.Authentication protocols for mobile network environment value-added services[J].IEEE Transactions on Vehicular Technology,2002,51(2):383-392.
[6]
王全来,韩继红,王亚第.数字移动通信系统中认证协议的设计与分析[J].电子与信息学报,2007,29(1):189-192.WANG Quan-lai,HAN Ji-hong,WANG Ya-di.Design and analysis of an authentication protocol for digital mobilecommunication system[J].Journal of Electronics&Information Technology,2007,29(1):189-192.(in Chinese)
[7]
彭华熹,冯登国.匿名无线认证协议的匿名性缺陷和改进[J].通信学报,2006,27(9):78-85.PENG Hua-xi,FENG Deng-guo.Security flaws and improvement to a wireless authentication protocol with anonymity[J].Journal on Communications,2006,27(9):78-85.(in Chinese)
[8]
周永彬,张振峰,冯登国.一种认证密钥协商协议的安全分析及改进[J].软件学报,2006,17(4):868-875.ZHOU Yong-bin,ZHANG Zhen-feng,FENG Deng-guo.Analysis and improvement of a security-provable mutuallyauthenticated key agreement protocol[J].Journal of Software,2006,17(4):868-875.(in Chinese)
[9]
LAMPORTL.Password authentication with insecure communication[J].Communication ACM,1981,24(11):770-771.