暂无分享,去创建一个
[1] Adi Shamir,et al. How to share a secret , 1979, CACM.
[2] Chun Chen,et al. Analysis and Improvement of a Secure and Efficient Handover Authentication for Wireless Networks , 2012, IEEE Communications Letters.
[3] John Bloom,et al. A modular approach to key safeguarding , 1983, IEEE Trans. Inf. Theory.
[4] Xuemin Shen,et al. SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks , 2013, Comput. Networks.
[5] Chun Chen,et al. Secure and Efficient Handover Authentication Based on Bilinear Pairing Functions , 2012, IEEE Transactions on Wireless Communications.
[6] Nitish Mehta,et al. Group authentication using paillier threshold cryptography , 2013, 2013 Tenth International Conference on Wireless and Optical Communications Networks (WOCN).
[7] Frederik Vercauteren,et al. Optimal Pairings , 2010, IEEE Transactions on Information Theory.
[8] Ramjee Prasad,et al. Threshold Cryptography-based Group Authentication (TCGA) scheme for the Internet of Things (IoT) , 2014, 2014 4th International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems (VITAE).
[9] Leonardo A. Martucci,et al. A Lightweight Distributed Group Authentication Mechanism , 2004 .
[10] Mohsen Guizani,et al. Handover authentication for mobile networks: security and efficiency aspects , 2015, IEEE Network.
[11] Gicheol Wang,et al. Authentication and Key Management in an LTE-Based Unmanned Aerial System Control and Non-payload Communication Network , 2016, 2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW).
[12] Richard E. Smith,et al. Authentication: From Passwords to Public Keys , 2001 .
[13] Lein Harn,et al. Group Authentication , 2013, IEEE Transactions on Computers.
[14] G. R. BLAKLEY. Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[15] Hung-Yu Chien,et al. Group Authentication with Multiple Trials and Multiple Authentications , 2017, Secur. Commun. Networks.
[16] Bo Huang,et al. A Novel Group-Based Handover Authentication Scheme with Privacy Preservation for Mobile WiMAX Networks , 2012, IEEE Communications Letters.
[17] Varalakshmi Perumal,et al. Secure and efficient hand-over authentication in WLAN using elliptic curve RSA , 2017, Comput. Electr. Eng..
[18] A. Sreekumar,et al. Secret sharing scheme using gray code and XOR operation , 2017, 2017 Second International Conference on Electrical, Computer and Communication Technologies (ICECCT).
[19] Chak-Kuen Wong,et al. A conference key distribution system , 1982, IEEE Trans. Inf. Theory.