2Me Gianluigi, Pirro Daniele, Sarrecchia Roberto. A mobile based approach to strong authentication on Web [-C]//Proceedings of the International Multi-Confer- ence on Computing in the Global Information Technol- ogy-(ICAEGIr06). Bucharest, 2006: 67-67.
3Hirano Manabu, Okuda Takeshi, Yamaguchi Suguru. Application for a simple device authentication frame- work: device authentication middleware using novel smart card software[C]//Proceedings of the 2007 In- ternational Symposium on Applications and the Inter- net Workshops(SAINTW~07). Japan, 2007 .- 31-34.
4Vivek K, Abraham A S, Rarresh S. Elliptic curve cryptog- raphy~J]. ACM Ubiquity, 2008, 9(20): 20-26.
5Winternitz Robert S. A secure one-way hash function built from DES~C]//2012 IEEE Symposium on Securi- ty and Privacy. IEEE Computer Society, 1984: 88-88.
6Xiao Juan, Wu Juan. The Research and Implementa- tion of SM2 Algorithm on COSEJ]. Advanced Materi- als Research, 2013, 816(6).. 1032-1036.
7Akkar Mehdi-Laurent, Giraud Christophe. An imple- mentation of DES and AES, secure against some at- tacks [- C-]//Cryptographic Hardware and Embedded Systems-CHES 2001. Springer Berlin Heidelberg, 2001: 309-318.