[1]Christian K, Mario P. Applied quantum cryptography[M]. Heidelberg: The Lecture Notes in Physics, 2010.[2]郭光灿. 未来的信息技术[电子文献类型/OL].http://lqcc.ustc.edu.cn. 2009.[3]刘桂, 蒋天炜, 喻松. 欧洲量子保密通信网络研究[J]. 光通信技术, 2011, 12(4): 132136.LIU Gui, JIANG Tianwei, YU Song. The research of European quantum confidential communications network[J]. Optical Communication Technology, 2011,12(4):132136.[4]杨军, 周贤伟. 基于离散对数问题的两层分散式组密钥管理方案[J]. 电子与信息学报, 2008, 30(6): 14571461.YANG Jun, ZHOU Xianwei. A twolevel decentralized group key management scheme based on the discrete logarithm problem[J]. Journal of Electronics & Information Technology, 2008, 30(6): 14571461.[5]Tsu W, Yuh T. Towards IDbased authenticated group key exchange protocol with identifying malicious participants[J]. Informatica, 2012, 23(2): 315334.[6]Jiang Z, Bin L, Chun C. EDKAS: An efficient distributed key agreement scheme using one way function trees for dynamic collaborative groups[J]. Computational Engineering in Systems Applications, 2006, 12(2): 12151222.[7]蒋小刚, 周贤伟, 郑连存. TGDH协议的分析与实现[J]. 计算技术与自动化, 2005, 24(3): 16631666.JIANG Xiaogang, ZHOU Xianwei, ZHENG Liancun. Design and implementation of TGDH protocol[J]. Computing Technology and Automation, 2006, 12(2): 12151222.[8]Pratima A, Xukai Z, Byrav R. DGKD: Distributed group key distribution with authentication capability[J]. Computer Science and Engineering, 2005, 13(1): 36753684.[9]Michael S, Gene T, Michael W. Key agreement in dynamic peer groups[J]. DARPATTO, 1998, 1098(3): 26742693. |