[1]
Liang Qinghua. Industrial control network technology[M]. Dalian University of technology press , 2006, 12.
Google Scholar
[2]
Wei Min, Wang Ping, Wang Quan. Research and implementation of security strategy for wireless industry control network [J]. Chinese Journal of Scientific Instrument, Vol. 30 No. 4, Apr, (2009).
Google Scholar
[3]
Miller V S. Use of elliptic curves in cryptography[A]. Advances in Cryptology Crypto 85[C]. Lecture Notes in Computer Science, 1985, (128), 417-426.
DOI: 10.1007/3-540-39799-x_31
Google Scholar
[4]
Koblit Z N. Elliptic curve cryptosystems[J]. Mathematics of Computation, 1987, 48(177) , 203-209.
DOI: 10.1090/s0025-5718-1987-0866109-5
Google Scholar
[5]
SUI Aifen, YANG Yixian, NIU Xinxin, LUO Shoushan. Research on the Authenticated key Agreement Protocol Based on Elliptic Curve Cryptography[J]. Journal of Beijing University of Posts and Telecommunications, Vol. 27 No. 3, Jun, (2004).
Google Scholar
[6]
Wang Hao, Wu Zhong-Fu, Wang Ping. Research on Security Model for Industrial Control Networks[J]. Computer Science, Vol. 34 No. 5. 96-98, May (2007).
Google Scholar
[7]
M Aydos, B Sunar, C K Koc. An elliptic curve cryptography based authentication and key agreement protocol for wireless communication[C]. The 2nd Int'l Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications, Dallas (1998).
Google Scholar
[8]
Kristin Lauter, Microsoft Corporation. The advantages of elliptic curve cryptography for wireless security[J]. IEEE Wireless Communications, Vol. 11. 62-67, Feb (2004).
DOI: 10.1109/mwc.2004.1269719
Google Scholar
[9]
Yang Ziheng, Zhou Ping, Liu Jia, Ding Qun. Improvement and implementation of the algorithm design of elliptic curve dot product based on GF(2n) [J]. Chinese Journal of Scientific Instrument, Vol. 30, No. 7. 1546-1551, Jul (2009).
Google Scholar