1. Foster I, Kesselman C. The grid: Blueprint for a new computing infrastructure. second edition. San Francisco, CA, USA: Morgan Kaufmann, 2004: 37
2. The Globus Alliance, Globus project(2005-08-10). http://www.globus. org/
3. Worldwide virtual computer, Legion project(2005-08-10). http://www. cs.virginia.edu/~legion/
4. European data grid, Gatagrid(2005-09-12).http://eu-datagrid.web. cern.ch/eu-datagrid
5. The webopedia computer dictionary, what is authentication? (2005-11-18).http://www.webopedia.com/TERM/A/authentication
6. Wu Min, Mu Hong, Wang Ru-chuan. Building grid computing environment using mobile agent technology. Journal of Chongqing University of Posts and Telecommunications, 2004, 16(2): 75-79 (in Chinese)
7. The free dictionary by FARLEX. Encyclopedia article about single sign-on(2005-11-18). http://encyclopedia. thefreedictionary.com/single+sign-on
8. The PKI page(2005-01-06). http://www.pki-page.org/
9. Boneh D, Franklin M. Identity-based encryption from the Weil pairing. Proceedings of 21st Annual International Cryptology Conference(CRYPTO 2001, Lecture Notes in Computer 2139), Aug 19-23, 2001, Santa Barbara, CA, USA. Berlin, Germany: Springer, Verlag, 2001: 213-229
10. Chen H B, Yang G, Wang J T, et al. An authenticated identity-based Key establishment and encryption scheme for wireless sensor networks. The Journal of China Universities of Posts and Telecommunications, 2006, 13 (2): 31-38
11. Nan Xiang-hao, Chen Zhong. A profile to network security techniques. Beijing, China: National Defence Industry Press, 2003: 52-67(in Chinese)
12. Zhong Ming, Yang Yi-xian. An efficient identification scheme based on discrete logarithm assumption. Journal of Beijing University of Posts and Telecommunications, 2001, 24(1): 52-55 (in Chinese) |