Bhasin K and Hayden J L. Space internet architectures andtechnologies for NASA Enterprises [J].International Journalof Satellite Communications.2002, 20(5):311-332[2]杨德明, 慕德俊, 许钟. Ad hoc空间网络密钥管理与认证方案[J]. 通信学报, 2006, 27(8): 104-107, 112.Yang De-ming, Mu De-jun, and Xu Zhong. Novel keymanagement and authentication scheme for ad hoc spacenetworks [J]. Journal on Communications, 2006, 27(8):104-107, 112.[3]彭长艳, 沈亚敏, 王剑等. 基于身份的空间网络安全研究[J].飞行器测控学报, 2008, 27(3): 56-62.Peng Chang-yan, Shen Ya-min, and Wang Jian, et a1..Research on identity-based space network security [J].Journal of Spacecraft TTC Technology, 2008, 27(3): 56-62.[4]吴平. 基于身份的Ad hoc网络密钥管理研究与仿真[D]. [硕士论文], 郑州: 信息工程大学, 2008.Wu Ping. Research and simulation of ad hoc network keymanagement based on identity [D]. Zhengzhou: InformationEngineering University, 2008.[5]Deng H.[J].Mukherjee A, and Agrawal P. Threshold andidentity-based key management and authentication forwireless ad hoc networks [C]. Proc of IEEE InternationalConferences on Information Technology (ITCC04).2004,:-[6]杜春来, 胡铭曾, 张宏莉. 在椭圆曲线域中基于身份认证的移动Ad hoc密钥管理框架[J]. 通信学报, 2007, 28(12): 53-59.Du Chun-lai, Hu Ming-zeng, and Zhang Hong-li. New groupkey management framework for mobile Ad hoc network basedon identity authentication in elliptic curve field[J]. Journal onCommunications, 2007, 28(12): 53-59.[7]Shamir A. Identity Based crypto systems and signatureschemes[C]. Proc. CRYPTO84, 1984: 47-53.[8]Boneh D and Franklin M. Dentity-based encryption forms theWeil pairing[C]. In: Kilian J. ed. Advances in CryptologyCRYPTO 2001, Lecture Notes in Computer Science 2139.Berlin: Springer-Verlag, 2001: 213-229.[9]Shamir A. How to share a secret [J]. Communications of theACM, 1979, 22(11): 6l2-6l3.
|