Citation: | MA Zhuo, LI Fenghua, MA Jianfeng, et al., “CL-TAP:An Efficient Certificateless Based Trusted Access Protocol for WLAN,” Chinese Journal of Electronics, vol. 23, no. 1, pp. 142-146, 2014, |
IEEE P802.11i/D10.0. Medium Access Control (MAC) Security Enhancements, Amendment 6 to IEEE Standard for Information technology Telecommunications and information exchange between systems Local and metropolitan area networks Specific requirements Part 11: Wireless Medium Access Control. 2004.
|
Chang-Hua He, M. Sundararajan, A. Datta, A. Derek, J.C. Mitchell, A modular correctness proof of IEEE 802.11i and TLS, Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS'05), Alexandria, VA, USA, pp.2-15, 2005.
|
Trusted Computing Group, TCG Trusted Network Connect TNC Architecture for Interoperability specification Version 1.3 Revision 6. 2008. https: //www.trustedcomputinggroup.org/
|
Jian Wang, Yanheng Liu and Yu Jiao,"Novel access and remediation scheme in hierarchical trusted network", Computer Communications, Vol.34, No.3, pp.375-383, 2011.
|
Aarthi Nagarajan, Vijay Varadharajan,"Dynamic trust enhanced security model for trusted platform based services", Article Future Generation Computer Systems, Vol.27, No.5, pp.564-573, 2011.
|
R. Housley, W. Polk, W. Ford, et al., Internet X.509 Public Key Infrastructure Certificate And Certificate Revocation List (CRL) Profile, The Internet Engineering Task Force (IETF), RFC 3280, 2002
|
P. Gutmann,"PKI: It's not dead, just resting", IEEE Computer, Vol.35, No.8, pp.41-49, 2002.
|
A. Shamir,"Identity-based cryptosystems and signature schemes", Proceedings of Advances in Cryptology CRYPTO'84, Vol.196 of Lecture Notes in Computer Science, Springer-Verlag, pp.47-53, 1985.
|
S.S. Al-Riyami, K. Paterson,"Certificateless public key cryptography", Proceedings of Advances in Cryptology Asiacrypt 2003, Vol.2894 of Lecture Notes in Computer Science, SpringerVerlag, pp.452-473, 2003.
|
D. Boneh, M. Franklin, Identity-based encryption from the Weil pairing, Advances in Cryptology CRYPTO 2001, Vol.2139 of Lecture Notes in Computer Science. Springer-Verlag, pp.213229, 2001.
|
C.J. Kudla,"Special signature schemes and key agreement protocols", Ph.D. Thesis, Royal Holloway: University of London, 2006.
|
B. LaMacchia, K. Lauter, A. Mityagin,"Stronger security of authenticated key exchange", Provable Security 2007, Vol.4784 of Lecture Notes in Computer Science. Berlin: Springer-Verlag, pp.1-16, 2007.
|
R. Canetti, H. Krawczyk,"Analysis of key-exchange protocols and their use for building secure channels", Advances in Cryptology EUROCRYPT '01, Springer-Verlag, pp.453-474, 2001.
|
W. Dai, Crypto++ 5.6.0 Benchmarks. https://www.cryptopp. com/benchmarks.html.
|