Computer Science ›› 2015, Vol. 42 ›› Issue (Z6): 420-424.
Previous Articles Next Articles
XIAO Yue-lei, ZHU Zhi-xiang and ZHANG Yong
[1] 黄振海,郭宏,王育民,等.GB15629.11-2003信息远程通信和信息交换局域网和城域网特定要求第11部分:无线局域网媒体访问控制和物理层规范[S].北京:中国标准出版社,2003 [2] 宽带无线IP工作组.GB15629.11-2003信息技术系统间远程通信和信息交换局域网和城域网特定要求第11部分:无线局域网媒体访问控制和物理层规范和GB15629.1102-2003 信息技术系统间远程通信和信息交换局域网和城域网特定要求第11部分:无线局域网媒体访问控制和物理层规范:2.4GHz频段较高速物理层扩展规范实施指南[EB/OL].[2006-01-10].http://www.chinabwips.org/ [3] 赖晓龙,曹军,铁满霞,等.GB 15629.11-2003/XG1-2006 信息远程通信和信息交换局域网和城域网特定要求第11部分:无线局域网媒体访问控制和物理层规范第1号修改单[S].北京:中国标准出版社,2006 [4] Tang Qiang.On the security of three versions of the WAI protocol in Chinese WLAN implementation plan[C]∥Proc of the second International Conference on Communications and Networking in China.Shanghai:ePrint,2007:333-339 [5] 铁满霞,李建东,王育民.WAPI密钥管理协议的PCL证明[J].电子与信息学报,2009,31(2):444-447 [6] Trusted Computing Group.TCG trusted network connect architecture for interoperability specification version 1.4[EB/OL].[2009-05-18].http://www.trustedcomputinggroup.org/ [7] 沈昌祥,肖跃雷,曹军,等.GB/T 29828-2013信息安全技术 可信计算规范 可信连接架构[S].北京:中国标准出版社,2006 [8] ISO/IEC.ISO/IEC 9798-3:1998/Amd.1:2010 Information tech-nology-Security techniques-Entity authentication-Part 3:Mechanisms using digital signature techniques AMENDMENT 1[S].ISO/IEC,2010 [9] Fabrega F J T,Herzog J C,Guttman J D.Strand space:proving security protocols correct[J].Journal of Computer Security,1999,7(2/3):191-230 [10] Herzog J C.The Diffie-Hellman key-agreement scheme in thestrand-space model[C]∥Proc of the 16th IEEE Computer Secu-rity Foundations Workshop.Pacific Grove:IEEE,2003:234-247 |
No related articles found! |
|