1 |
HADDADPAJOUH H, DEHGHANTANHA A, PARIZI R M,et al .A survey on internet of things security:requirements,challenges,and solutions [J].Internet of Things,2021,14:100129/1-19.
|
2 |
DIFFIE W, HELLMAN M .New directions in cryptography[J].IEEE Transactions on Information Theory,1976,22(6):644-654.
|
3 |
GAMAL T E .A public key cryptosystem and a signature scheme based on discrete logarithms[J].IEEE Transactions on Information Theory,1985,31:469-472.
|
4 |
RIVEST R L, SHAMIR A, ADLEMAN L .A method for obtaining digital signatures and public-key cryptosystems[J].Communications of the ACM,1978,21(2):120-126.
|
5 |
HU Q L, DUAN M X, YANG Z B,et al .Efficient parallel secure outsourcing of modular exponentiation to cloud for IoT applications[J].IEEE Internet of Things Journal,2020,8(16):12782-12791.
|
6 |
AL-NAJI F H, ZAGROUBA R .A survey on continuous authentication methods in internet-of-things environment[J].Computer Communications,2020,163:109-133.
|
7 |
张帆 .基于区块链与属性基加密的物联网访问控制研究[D].南京:南京邮电大学,2020.
|
8 |
WU Y, SONG L, LIU L .The new method of sensor data privacy protection for IoT[J].Shock and Vibration,2021:3920579/1-11.DOI:10.1155/2021/3920579 .
|
9 |
杨宏志,袁凌云,王舒 .基于SM2国密算法优化的区块链设计[J].计算机工程与设计,2021,42(3):622-627.
|
|
YANG Hong-zhi, YUAN Ling-yun, WANG Shu .Optimized blockchain design based on SM2 algorithm [J].Computer Engineering and Design,2021,42(3):622-627.
|
10 |
吴皓威,黄风娇,闫莲,等 .面向可疑中继通信网络的合法窃听方案[J].华南理工大学学报(自然科学版),2022,50(10):70-79.
|
|
WU Haowei, HUANG Fengjiao, YAN Lian,et al .Legitimate eavesdropping scheme for suspicious relay communication networks[J].Journal of South China University of Technology(Natural Science Edition),2022,50(10):70-79.
|
11 |
QIN J C, BAI Z Y .Design of new format for mass data compression[J].Journal of China Universes of Posts and Telecommunications,2011,18(1):121-128.
|
12 |
QIN J C, LU Y Q, ZHONG Y .Fast algorithm of truncated Burrows-Wheeler transform coding for data compression of sensors[J].Journal of Sensors,2018:6908760/1-17.DOI:10.1155/2018/6908760 .
|
13 |
QIN J C, LU Y Q, ZHONG Y .Block-split array coding algorithm for long-stream data compression[J].Journal of Sensors,2020:5726527/1-21.DOI:10.1155/2020/5726527 .
|
14 |
QIN J C, LU Y Q, ZHONG Y .Parallel algorithm for wireless data compression and encryption[J].Journal of Sensors,2017:4209397/1-11.DOI:10.1155/2017/4209397 .
|
15 |
覃健诚,陆以勤 .利用数据压缩编码的混沌同步加密解密方法及其装置:201210386406.9[P].2012-10-13.
|
16 |
LU Y Q, SU W Y, QIN J C .LDPC decoding on GPU for mobile device[J].Mobile Information Systems,2016:7048482/1-6.DOI:10.1155/2016/7048482 .
|
17 |
LU Y Q, WU D W, QIN J C .Wireless authentication center based on embedded Wi-Fi technology[J].WIT Transaction on Information and Communication Technologies,2014,59:387-394.
|
18 |
LU Y Q, ZHAI J, ZHU R H,et al .Study of wireless authentication center with mixed encryption in WSN[J].Journal of Sensors,2016:9297562/1-7.DOI:10.1155/2016/9297562 .
|
19 |
GORDON D M .A survey of fast exponentiation mehods[J].Journal of Algorithms,1998,27(1):129-146.
|
20 |
KNUTH D E .计算机程序设计艺术(卷2)[M].北京:人民邮电出版社,2016.
|
21 |
MOSS A, PAGE D, SMART N .Toward acceleration of RSA using 3D graphics hardware[C]∥ Proceedings of the 11th IMA International Conference on Cryptography and Coding.Cirencester:Springer,2007:364-383.
|
22 |
乔洋 .基于GPU的RSA算法并行研究与设计及OpenCL实现[D].广州:华南理工大学,2013.
|
23 |
张盛仕 .基于国密算法加密技术的SoC设计与优化[D].广州:广东工业大学,2019.
|
24 |
覃健诚,钟宇,陆以勤,等 .基于梅森数的密钥交换或公钥密码加密优化方法及系统:202111668723.5 [P].2022-04-29.
|