[1] Foschini G J. Layered space-time architecture for wireless communication in a fading environment when using multielement antennas[J]. Bell Labs Tech J, 1996, 1(2): 41-59.
[2] Kim S W, Kim K P. Log-likehood-ratio-based detection ordering in V-BLAST[J]. IEEE Trans on Commun, 2006, 54(2): 302-307.
[3] De J Y L C, Willink T J. Iterative tree search detection for MIMO wireless systems[J]. IEEE Trans on Commun, 2005, 53(6): 930-935.
[4] Murugan A D, Gamal H E, Damen M O, et al. A unified framework for tree search decoding: rediscovering the sequential decoder[J]. IEEE Trans on Inform Theory, 2006, 52(3): 933-953.
[5] Hochwald B M, Ten B S. Achieving near-capacity on a multiple-antenna channel[J]. IEEE Trans on Commun, 2003, 51(3): 389-399.
[6] Sellathurai M, Haykin S. Turbo-BLAST for wireless communications: theory and experiments[J]. IEEE Trans on Signal Process, 2002, 50(10): 2538-2546.
[7] 孙艳华, 龚萍, 梁鹏, 等. 基于列表的迭代分支定界MIMO检测算法[J]. 北京邮电大学学报, 2006, 29(1): 50-53. Sun Yanhua, Gong Ping, Liang Peng, et al. List based iterative branch algorithm for MIMO detection[J]. Journal of Beijing University of Posts and Telecommunications, 2006, 29(1): 50-53.(上接第67页)
[3] Huang Xinyi, Susilo W, Mu Yi. On the security of certificateless signature schemes from asiacrypt 2003//Proc CANS 2005. Berlin: Springer-Verlag, 2005:13-25.
[4] Ming Yang, Shen Xiaoqin, Wang Yumin. Certificateless universal designated verifier signature schemes[J]. The Journal of China Universities of Posts and Telecommunications, 2007, 14(3): 85-90.
[5] Gorantla M C, Saxena A. An efficient certificateless signature scheme//Proc of CIS 05. Berlin: Springer-Verlag, 2005: 110-116.
[6] Boneh D, Lynn B, Shacham H. Short signatures from the weil pairing//Proc of Asiacrypt 01. Berlin: Springer-Verlag, 2001: 514-532.
[7] 禹勇, 杨波, 李发根, 等. 一个有效的代理环签名方案[J]. 北京邮电大学学报, 2007, 30(3): 23-26. Yu Yong, Yang Bo, Li Fagen, et al. An efficient proxy ring signature scheme[J]. Journal of Beijing University of Posts and Telecommunications, 2007, 30(3): 23-26.
[8] Choi K, Park J, Hwang J, et al. Efficient certificateless signature schemes//Proc of ACNS 2007. Berlin:Springer-Verlag, 2007: 443-458.
[9] Zhang Zhengfeng, Wong D S, Feng Dengguo. Certificateless public-key signature: security model and efficient construction//Proc of ACNS 06. Berlin: Springer-Verlag, 2006: 293-308.
[10] Pointcheval D, Stern J. Security proofs for signature schemes[J]. Journal of Cryptology, 2000, 13(3):1-12.
[11] Dang Lanjun, Kou Weidong, Dang Nan, et al. Mobile IP registration in certificateless key infrastructure[J]. IET Information Security, 2007, 1(4):167-173. |