[1] Yi X, Tan C H, and Siew C K, et al.. ID-based key agreement for multimedia encryption[J].IEEE Trans. on Consumer Electronics.2002, 48 (2):298-303 [2] Bird R.[J].Gopal I, and Herzberg A, et al.. Systematic design of two-party authentication protocols. Advances in CryptologyCRYPTO91, Santa Barbara.1991,:- [3] Diffie W, Oorschot P, and Wiener M. Authentication and authenticated key exchanges. Designs, Codes and Cryptography, 1992 2(2): 107-125. [4] Bellare M and Rogaway P. Provably secure session key distribution. Advances in CryptologyCRYPTO93, Santa Barbara, 1993: 232-249. [5] 毛文波. 现代密码学: 理论与实践. 北京: 电子工业出版社, 2004: 1-477. [6] Wilson S B and Menezes A. Authenticated Diffie-Hellman key agreement protocols. Fifth Annual Workshop on Selected Areas in Cryptography, Ontario, 1998: 339-361. [7] 卿斯汉. 安全协议20年研究进展. 软件学报, 2003, 14 (10): 1740-1752. Qing Si-han. Twenty years development of security protocols research. Journal of Software, 2003, 14 (10): 1740-1752. [8] 卿斯汉. 安全协议的设计与逻辑分析. 软件学报, 2003, 14(7): 1300-1309. Qing Si-han. Design and logical analysis of security protocols. Journal of Software, 2003, 14(7): 1300-1309. [9] 范红, 冯登国. 安全协议理论与方法. 北京: 科学出版社, 2003: 13-46. [10] Schneier B. Applied Cryptography: Protocols, Algorithms, and Source Code in C. New York: John Wiley Sons, Inc. 1996: 246-246.
|