1YIN A, WANG S. A novel encryption scheme based on timestamp in gigabit Ethemet passive optical network using AES-128 [J]. Optik-Intemational Journal for Light and Electron Optics, 2014, 125 (3): 1361-1365.
2YAN Y, DITTMANN L. Security Challenges and Solutions for Telemedicine over EPON [C]//eTELEMED 2014, The Sixth International Conference on eHealth, Telemedicine, and Social Medicine, Mar 22-27, 2014. Barcelona, Spain:2014.
3G-OFF Y L, FUJIMOTO Y, MURAKAMI K, et al. Encryption layer comparison[J]. IEEES02. 3ah Ethernet in the first mile, White Paper, 2009, (1): 119-122.
4ZI-YI F, ZONG-JIE L. Study of authentication and eneryption scheme in EPON [J]. Proc. ISECS, 2010(7): 176-178.
5YAN Y I N, YUE-JIN Z. Research on EPON Two-way Authenticated Eneryption Scheme based on the MAC [J]. International Journal of Digital Content Technology & its Applications, 2012, 6(21 ): 5-7.
6BARRETO P S L M, LIBERT B, MCCULLAGH N, et al. Efficient and provably-secure identity-based signatures and signcryption from bilinear maps [M].Springer Berlin Heidelberg:Advances in Cryptology-ASIACRY- PT 2005,2005.
7MIAO S, ZHANG F, LI S, et al. On security of a certificateless signcryption scheme[J]. Information Sciences, 2013, 232(20): 475-481.