|
[1]Vinoski, S. (2006). "Advanced Message Queuing Protocol" . Ieee Internet Computing 10 (6): 87–89. doi:10.1109/MIC.2006.116. [2]Definition of: wire protocol. PCMAG.COM. Retrieved 2011-04-11 Available: http://www.pcmag.com/ [3]Jacques Vélu, Courbes elliptiques , Société Mathématique de France, 57, 1-152, Paris, 1978. [4]The Original RSA Patent as filed with the U.S. Patent Office by Rivest; Ronald L. (Belmont, MA), Shamir; Adi (Cambridge, MA), Adleman; Leonard M. (Arlington, MA), December 14, 1977, U.S. Patent 4,405,829. [5]Portal 2 PC/PS3 Cross-platform. Eurogamer. Retrieved January 24, 2012. [6]Technologies and Applications of Artificial Intelligence: 19th. Shin-Ming Cheng, Min-Yuh Day - 2014 - Computers. [7]OASIS Forms AMQP Technical Committee to Advance Business Messaging Interoperability Within Middleware, Mobile, and Cloud Environments. Available: http://www.openamq.org/ [8]AMQP version 1.0 provides the pieces necessary to enable messaging clients and servers to interoperate seamlessly, regardless of their technology. Available: https://www.amqp.org/product/architecture/ [9]Vinoski, S. (2006). «Advanced Message Queuing Protocol». IEEE Internet Computing 10: 87-89. doi:10.1109/MIC.2006.116. [10]NIST, Recommended Elliptic Curves for Government Use July 1999. [11]The selection a = -3 for the coefcient of x was made for reasons of efciency; see IEEE P1363. [12]NIST, Special Publication 800-56A, Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography, March, 2006. [13]Standards for Efficient Cryptography Group. SEC 1: Elliptic Curve Cryptography, Mar. 2009. Version 2.0. [14]SECG, SEC 2: Recommended Elliptic Curve Domain Parameters January 27, 2010. [15]OASIS AMQP version 1.0, section 3.2.1. OASIS AMQP Technical Committee. Retrieved 18 June 2012. Available: http://docs.oasis-open.org/amqp/core/v1.0/amqp-core-messaging-v1.0.html/ [16]Wikipedia. Message-oriented middleware. Available: https://en.wikipedia.org/wiki/Message-oriented_middleware [17]Aurea SonicMQ, Available: http://www.aurea.com/legal/sonic-mq/ [18]Fiorano Software's FioranoMQ, Available: http://www.fiorano.com/products/Enterprise-Messaging/JMS/Java-Message-Service/FioranoMQ.php [19]Project OpenJMS, Available: http://openjms.sourceforge.net [20]Rabbit MQ. Available: http://www.rabbitmq.com/ [21]Wikipedia. Erlang. Available: https://zh.wikipedia.org/wiki/Erlang [22]Wikipedia. Hypervisor. Available: https://en.wikipedia.org/wiki/Hypervisor [24]Tanja Lange, " Koblitz curve cryptosystems", in Information-Security and Cryptography, Ruhr-University of Bochum, Universitätsstrasse 150, D-44780 Bochum, Germany, 24 August 2004. [25]Tawny Lim, "A Study of Koblitz Curves," in Department of Computer Science, University of California, Santa Barbara, CA 93106. [26]Wikipedia. Secure Hash Algorithm 1. Available: https://en.wikipedia.org/wiki/SHA-1 [27]A (relatively easy to understand) primer on elliptic curve cryptography. Available: http://arstechnica.com/security/2013/10/a-relatively-easy-to-understand-primer-on-elliptic-curve-cryptography/ [28]National Security Agency. “The Case for Elliptic Curve Cryptography,” 2009. Available: http://www.nsa.gov/business/programs/elliptic_curve.shtml. [29]M. Alimohammadi, and A. A. Pouyan. “Performance Analysis of Cryptography Methods for Secure Message Exchanging in VANET,” 2014. Available: http://www.ijser.org/paper/Performance-Analysis-of-Cryptography-Methods-for-Secure.html.. [30]FatCow Web Hosting. Available: http://www.fatcow.com/. [31]Hannes Tschofenig, Manuel Pégourié-Gonnard "ARM ECC Performance nvestigations". 25th March 2015.
|