4ERGEN S C. ZigBee/IEEE 802.15.4 Summary [R]. Berkeley, CA, USA: University of California Berkeley, 2004: 4-21.
5HOPPER N J, BLUM M. Secure Human Identification Protocols [C]//Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security (Asiacrypt'01), Dec 9-13, 2001, Gold Coast, Australia. LNCS 2248. Berlin, Germany: Springer - Verlag, 2001:52-66.
6EDNEY J.ARBAUGH W A.无线局域网安全实务--WPA与802.11i[M].周正,译.北京:人民邮电出版,2006.
8CHIRILLO J,BLAUL S I.存储安全技术:SAN、NAS和DAS的安全保护[M].金甄平,王宝生,洪平,等译.北京:电子工业出版社,2004.
9CHADWICK D W, OTENKO A. The PERMIS X,509 Role Based Privilege Management Infrastructure [J]. Future Generation Computer Systems, 2003, 19(2): 277-289.
10WAKEFIELD M. EPRI Smart Grid Demonstration [R]. Palo Alto, CA,USA: Electric Power Research Institute, 2009:1-4.