参考文献/References:
[1] Zhang Zhiyong,Pei Qingqi,Ma Jianfeng,et al.Security and trust in digital rights management[J].International Journal of Network Security,2009,9(3):247-263.
[2]Jamkhedkar Pramod A,Heileman Gregory L.Digital rights management architectures[J].Computers and Electrical Engineering,2009,35(2):376-394.
[3]Liu Chenglian,Lin Chenglu,Harn Lien,et al.Security analysis of remote password authentication schemes for multi-server architecture using neural networks[J].Advanced Science Letters,2012,7(1):680-683.
[4]Debiao H E,Hao Hu.Cryptanalysis of a smartcard-based user authentication scheme for multi-server environments[J].IEICE Transations on Communications,2012,95(9):3 052-3 054.
[5]王尚平,杨春霞,王晓峰,等.基于双线性对的隐藏签名认证方案[J].电子与信息学报,2008,30(2):486-489.
[6]李超零,周雁舟,李立新,等.基于代理的隐私CA模型[J].信息工程大学学报,2010,11(1):113-117.
[7]宋成,孙宇琼,彭维平,等.改进的直接匿名认证方案[J].北京邮电大学学报,2011,34(3):62-65.
[8]Zhou F C,Xu J,Li H,et al.Group signature based on non-interactive zero-knowledge proofs[J].China Communications,2011,8(2):34-41.
[9]刘怀明,魏仕民.基于椭圆曲线的ElGamal型数字签名[J].吉林师范大学学报:自然科学版,2012,33(3):57-60.