| 期刊論文1. | Perlman, Radia(199911)。An Overview of PKI Trust Models。IEEE Network,November/December,38-43。 | 2. | Lenstra, Arjen K.、Verheul, Eric R.(2001)。Selecting cryptographic key sizes。Journal of Cryptology,14(4),255-293。 | 3. | Koblitz, Neal(1987)。Elliptic Curve Cryptosystems。Mathematics of Computation,48(177),203-209。 | 會議論文1. | Rowstron, A.、Druschel, P.(2001)。Pastry: Scalable, Distributed Object Location and Routing for Large-Scale Peer-to-Peer Systems。IFIP/ACM International Conference on Distributed Systems Platforms。Heidelberg, Germany:Springer。329-350。 | 2. | Miller, Victor S.(1986)。Use of Elliptic Curves in Cryptography。CRYPTO 1985: Conference on the Theory and Application of Cryptographic Techniques。Springer-Verlag。417-426。 | 3. | Stoica, I.、Morris, R.、Karger, D.(2001)。Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications。ACM SIGCOMM,149-160。 | 4. | Ratnasamy, S.、Francis, P.、Handley, M.、Karp, R.、Shenker, S.(2001)。A Scalable Content-Addressable Network。ACM SIGCOMM。San Diego, CA:Association for Computing Machinery。161-172。 | 其他1. | Bresson, E., Chevassut, O., and Pointcheval, D.(2007)。Provably secure authenticated group Diffie-Hellman key exchange。 | 2. | Castro, M., Druschel, P., Ganesh, A., Rowstron, A., and Wallach, D. S.(2002)。Secure routing for structured peer-to-peer overlay networks。 | 3. | Chou, C.C., Wei, S.L., Kuo, C.C., and Naik, K.(2007)。An efficient anonymous communication protocol for peer-to-peer applications over mobile ad-hoc networks。 | 4. | Dingledine, R., Freedman, M., and Molnar, D.(2000)。The FreeHaven project: Distributed anonymous storage service。 | 5. | Fahrenholtz, D. and Lamersdorf, W.(2002)。Transactional security for a distributed reputation management system。 | 6. | Friedman, A. and Camp, L.J.(2005)。Security in peer to peer systems。 | 7. | Gorantla, M.C., Gangishetti, R., and Saxena, A(2005)。A survey on ID-based cryptographic primitives。 | 8. | Groove Networks.(2002)。A white paper: Groove security architecture。 | 9. | Lee, H. and Kim, K.(2003)。An adaptive authentication protocol based on reputation for peer-to-peer system。 | 10. | Li, P., Lin, Y., and Zeng, W.(2006)。Search on security in sensor networks。 | 11. | Lu, L., Han, J., Hu, L., Huai, J., Liu Y., and Ni, L.M.(2007)。Pseudo trust: Zeroknowledge based authentication in anonymous peer-to-peer protocols。 | 12. | Lua, E.K. and Crowcroft, J.(2004)。A survey and comparison of peer-to-peer overlay network schemes。 | 13. | MacQuire, A., Brampton, A., Rai, I.A., Race, N.J.P., and Mathy, L.(2008)。Authentication in stealth distributed hash tables。 | 14. | Milanovic, N., Malek, M., Davidson, A., and Milutinovic, V.(2004)。Routing and security in mobile ad hoc networks。 | 15. | Mitchell, C.J.(2003)。Public key encryption using block ciphers。 | 16. | Sit, E. and Morris, R.(2002)。Security considerations for peer-to-peer distributed hash tables。 | 17. | Su, P.C. and Tsai, C.H.(2010)。Self-certified key exchange scheme based on hybrid mode problems。 | 18. | Takano, Y., Isozaki N., and Shinoda, Y.(2006)。Multipath key exchange on P2P networks。 | 19. | Weimerskirch, A. and Westhoff, D.(2003)。dentity certified authentication for ad-hoc networks。 | 20. | Wong, F.L. and Stajano, F.(2007)。Multichannel security protocols。 | 21. | Xiao, L., Xu, Z., and Zhang, X.(2003)。Low-cost and reliable mutual anonymity protocols in peer-to-peer networks。 | 22. | Zhou, L. and Haas, Z.J.(1999)。Securing ad hoc networks,。 | 23. | Zimmermann, P.(2001)。PGP 7.0 User’s Guide。 | |
| |