徐志博, 马恒太. 一种用于卫星网络安全认证的协议设计与仿真[J]. 计算机工程与应用, 2007, 43(17): 130-132.Xu Zhi-bo and Ma Heng-tai. Design and simulation ofsecurity authentication protocol for satellite network [J].Computer Engineering and Applications, 2007, 43(17):130-132.[2]唐志华. 基于临近空间的目标探测及宽带通信[J]. 无线电工程, 2007, 37(11): 28-30.Tang Zhi-hua. Target acquisition and broadbandcommunications based on near-space vehicles [J]. RadioEngineering of China. 2007, 37(11): 28-30.[3]杨德明, 慕德俊, 许钟. Ad hoc 空间网络密钥管理与认证方案[J]. 通信学报. 2006, 27(8): 104-107.Yang De-ming, Mu De-jun, and Xu Zhong. Novel keymanagement and authentication scheme for Ad hoc spacenetworks [J]. Journal on Communications, 2006, 27(8):104-107.[4]Zhou L and Hass Z J. Securing Ad hoc networks [J]. IEEENetworks, 1999, 13(6): 24-30.[5]Wu B, Wu J, and Fernandez E B, et al.. Secure and efficientkey management in mobile Ad hoc networks[C]. Proc of the19th IEEE International Parallel and Distributed ProcessingSymposium (IPDPS05). Denver: IEEE Computer Society.2005: 288-295.[6]Dong Y, Wing G, and Sui A, et al.. Providing distributedcertificate authority service in mobile ad hoc networks[C].Proc of the First International Conference on Security andPrivacy for Emerging Areas in Communications Networks.Athens: IEEE Computer Society, 2005: 149-156.[7]曾萍, 陈瑞利, 方勇. 基于自认证公钥的全分布式移动Adhoc 网络密钥管理方案[J]. 计算机应用研究, 2008, 25(6):1779-1782.Zeng Ping, Chen Rui-li, and Fang Yong. Fully-distributedkey management scheme based on self-certified public key formobile Ad hoc network [J]. Application Research ofComputers, 2008, 25(6): 1779-1782.[8]Luo H Y.[J].Zerfos P, and Kong J, et al.. Self-securing Ad hocNetworks[C]. Proc of the Seventh IEEE Symposium onComputers and Communications (ISCC02). IEEEComputer Society.2002,:-[9]Shamir A. How to share a secret [J]. Communications of theACM, 1979, 22(11): 6l2-6l3.
|