Design and Implementation of Secure Vehicle Communication Protocols for WAVE Communication Systems
暂无分享,去创建一个
[1] Michael D. Smith,et al. A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..
[2] D. Pishva,et al. AES and Confidentiality from the inside out , 2010, 2010 The 12th International Conference on Advanced Communication Technology (ICACT).
[3] Kwang-Cheul Shin. A Robust and Secure Remote User Authentication Scheme Preserving User Anonymity , 2013 .
[4] Igor E. Shparlinski,et al. On the Unpredictability of Bits of the Elliptic Curve Diffie--Hellman Scheme , 2001, CRYPTO.
[5] Eric Rescorla,et al. Datagram Transport Layer Security , 2006, RFC.
[6] Behrouz A. Forouzan,et al. Data Communications and Networking , 2000 .
[7] Gavin Lowe,et al. An Attack on the Needham-Schroeder Public-Key Authentication Protocol , 1995, Inf. Process. Lett..
[8] C. Krishna Kumar,et al. SAFETY MEASURES AGAINST MAN-IN-THE-MIDDLE ATTACK IN KEY EXCHANGE , 2012 .
[9] Kouichi Sakurai,et al. Grouping proof for RFID tags , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).
[10] R. Benice,et al. An Analysis of Retransmission Systems , 1964 .
[11] 서화정,et al. WAVE 하드웨어 암호 라이브러리에 적합한 효율적인 AES-CCM 구조 설계 , 2013 .