[1]
|
J. Scudder, “Routing/addressing problem solution space,” 2007, http://www.arin.net/meetings/minutes/ARIN_XX/ PDF/wednesday/SolutionSpace_Scudder.pdf.
|
[2]
|
R. Tu, J. S. Su, Z. W. Meng, and F. Zhao, “UCEN: User centric enterprise network,” in Proceedings IEEE ICACT’08, Phoenix Park, Korea, pp. 66–71, Feb 2008.
|
[3]
|
D. Meyer and K. Fall, “Report from the IAB workshop on routing and addressing,” Internet Draft, 2006.
|
[4]
|
R. Tu and J. S. Su, “A hash-based locator/ID mapping mechanism,” The Computer Engineering and Science, No. 1, pp. 9–12, 2009.
|
[5]
|
D. Meyer, “The locator identity separation protocol (LISP),” The Internet Protocol Journal, Vol. 11, No. 1, pp. 23, 2008.
|
[6]
|
A. J. Menezes, “Elliptic curve public key crytosystems,” Kluwer International Series in Engineering and Computer Science, 1993.
|
[7]
|
N. Jansma and B. Arrendondo, “Performance comparison of elliptic curve and RSA digital signature,” Technical Report, 2004. http://www.nicj.net/files/498termpaper.pdf.
|
[8]
|
Certicom Corp, “The elliptic curve crypto system for smart cards,” Certicom White Paper, 1998, http://www. comms.scitech.susx.ac.uk/fft/crypto/ECC_SC.pdf.
|
[9]
|
W. Chou and Laerence, “Elliptic curve cryptography and its applications to mobile device,” Project Report, Uni-versity of Maryland, 2003, http://www.cs.umd.edu/Hon-ors/reports/ECCpaper.pdf.
|