-
2
-
-
46749134372
-
-
D. Chaum, Blind signature systems, in: Proceedings of Advances in Crypto'83, New York, USA, 1983, p. 153.
-
D. Chaum, Blind signature systems, in: Proceedings of Advances in Crypto'83, New York, USA, 1983, p. 153.
-
-
-
-
3
-
-
46749158359
-
An identity-based random key pre-distribution scheme for direct key establishment to prevent attacks in wireless sensor networks
-
Das A.K. An identity-based random key pre-distribution scheme for direct key establishment to prevent attacks in wireless sensor networks. International Journal of Network Security 6 2 (2008) 134-144
-
(2008)
International Journal of Network Security
, vol.6
, Issue.2
, pp. 134-144
-
-
Das, A.K.1
-
4
-
-
46749113515
-
-
F. Dotzer, F. Kohlmayer, T. Kosch, M. Strassberger, Secure communication for intersection assistance, in: Proceedings of the 2nd International Workshop on Intelligent Transportation, Hamburg, Germany, 2005.
-
F. Dotzer, F. Kohlmayer, T. Kosch, M. Strassberger, Secure communication for intersection assistance, in: Proceedings of the 2nd International Workshop on Intelligent Transportation, Hamburg, Germany, 2005.
-
-
-
-
5
-
-
17144370965
-
-
S. Eichler, F. Dotzer, C. Schwingenschlogl, F.J.F. Caro, J. Eberspacher, Secure routing in a vehicular ad hoc network, in: IEEE 60th Vehicular Technology Conference, 2004, pp. 3339-3343.
-
S. Eichler, F. Dotzer, C. Schwingenschlogl, F.J.F. Caro, J. Eberspacher, Secure routing in a vehicular ad hoc network, in: IEEE 60th Vehicular Technology Conference, 2004, pp. 3339-3343.
-
-
-
-
6
-
-
84874800178
-
A public-key cryptosystem and a signature scheme based on discrete logarithms
-
ElGamal T. A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory IT-31 4 (1985) 469-472
-
(1985)
IEEE Transactions on Information Theory
, vol.IT-31
, Issue.4
, pp. 469-472
-
-
ElGamal, T.1
-
7
-
-
46749139551
-
-
M. Gruteser, D. Grunwald, Enhancing location privacy in wireless LAN through disposable interface identifiers, in: Proceedings of WMASH, San Diego, CA, 2003.
-
M. Gruteser, D. Grunwald, Enhancing location privacy in wireless LAN through disposable interface identifiers, in: Proceedings of WMASH, San Diego, CA, 2003.
-
-
-
-
8
-
-
2542616812
-
The quest for personal control over mobile location privacy
-
He Q., Wu D., and Khosla P. The quest for personal control over mobile location privacy. IEEE Communications Magazine 42 5 (2004) 130-136
-
(2004)
IEEE Communications Magazine
, vol.42
, Issue.5
, pp. 130-136
-
-
He, Q.1
Wu, D.2
Khosla, P.3
-
9
-
-
0036579171
-
Traceability on low-computation partially blind signatures for electronic cash
-
Hwang M.-S., Lee C.-C., and Lai Y.-C. Traceability on low-computation partially blind signatures for electronic cash. IEICE Transactions on Fundamentals on Electronics, Communications and Computer Sciences E85-A 5 (2002) 1181-1182
-
(2002)
IEICE Transactions on Fundamentals on Electronics, Communications and Computer Sciences
, vol.E85-A
, Issue.5
, pp. 1181-1182
-
-
Hwang, M.-S.1
Lee, C.-C.2
Lai, Y.-C.3
-
10
-
-
0142023013
-
An untraceable blind signature scheme
-
Hwang M.-S., Lee C.-C., and Lai Y.-C. An untraceable blind signature scheme. IEICE Transactions on Fundamentals on Electronics, Communications and Computer Sciences E86-A 7 (2003) 1902-1906
-
(2003)
IEICE Transactions on Fundamentals on Electronics, Communications and Computer Sciences
, vol.E86-A
, Issue.7
, pp. 1902-1906
-
-
Hwang, M.-S.1
Lee, C.-C.2
Lai, Y.-C.3
-
11
-
-
0041698517
-
A remote user authentication scheme using hash functions
-
Lee C.-C., Li L.-H., and Hwang M.-S. A remote user authentication scheme using hash functions. ACM Operating Systems Review 36 4 (2002) 23-29
-
(2002)
ACM Operating Systems Review
, vol.36
, Issue.4
, pp. 23-29
-
-
Lee, C.-C.1
Li, L.-H.2
Hwang, M.-S.3
-
12
-
-
34547877223
-
Secure communications for cluster-based ad hoc networks using node identities
-
Lee J.-S., and Chang C.-C. Secure communications for cluster-based ad hoc networks using node identities. Journal of Network and Computer Applications 30 4 (2007) 1377-1396
-
(2007)
Journal of Network and Computer Applications
, vol.30
, Issue.4
, pp. 1377-1396
-
-
Lee, J.-S.1
Chang, C.-C.2
-
13
-
-
34247376546
-
-
T. Leinmüller, C. Maihöfer, E. Schoch, F. Kargl, Improved security in geographic ad hoc routing through autonomous position verification, in: Proceedings of the 3rd International Workshop on Vehicular Ad Hoc Networks, Los Angeles, USA, 2006, pp. 57-66.
-
T. Leinmüller, C. Maihöfer, E. Schoch, F. Kargl, Improved security in geographic ad hoc routing through autonomous position verification, in: Proceedings of the 3rd International Workshop on Vehicular Ad Hoc Networks, Los Angeles, USA, 2006, pp. 57-66.
-
-
-
-
14
-
-
33845597602
-
Position verification approaches for vehicular ad hoc networks
-
Leinmüller T., Schoch E., and Karql F. Position verification approaches for vehicular ad hoc networks. IEEE Wireless Communications 13 5 (2006) 16-21
-
(2006)
IEEE Wireless Communications
, vol.13
, Issue.5
, pp. 16-21
-
-
Leinmüller, T.1
Schoch, E.2
Karql, F.3
-
15
-
-
34547529829
-
-
T. Leinmüller, E. Schoch, C. Maihöfer, Security requirements and solution concepts in vehicular ad hoc networks, in: Proceedings of the 4th Annual Conference on Wireless on Demand Network Systems and Services, 2007, pp. 84-91.
-
T. Leinmüller, E. Schoch, C. Maihöfer, Security requirements and solution concepts in vehicular ad hoc networks, in: Proceedings of the 4th Annual Conference on Wireless on Demand Network Systems and Services, 2007, pp. 84-91.
-
-
-
-
16
-
-
0012132506
-
A non-interactive public-key distribution system
-
Maurer U.M., and Yacobi Y. A non-interactive public-key distribution system. Designs, Codes and Cryptography 9 3 (1996) 305-316
-
(1996)
Designs, Codes and Cryptography
, vol.9
, Issue.3
, pp. 305-316
-
-
Maurer, U.M.1
Yacobi, Y.2
-
17
-
-
33745950446
-
-
H. Moustafa, G. Bourdon, Y. Gourhant, Aaa in vehicular communication on highways with ad hoc networking support: a proposed architecture, in: Proceedings of the 2nd ACM International Workshop on Vehicular Ad Hoc Networks, 2005, pp. 79-80.
-
H. Moustafa, G. Bourdon, Y. Gourhant, Aaa in vehicular communication on highways with ad hoc networking support: a proposed architecture, in: Proceedings of the 2nd ACM International Workshop on Vehicular Ad Hoc Networks, 2005, pp. 79-80.
-
-
-
-
18
-
-
33750938846
-
-
K. Plossl, T. Nowey, C. Mletzko, Towards a security architecture for vehicular ad hoc networks, in: The First International Conference on Availability, Reliability and Security, 2006.
-
K. Plossl, T. Nowey, C. Mletzko, Towards a security architecture for vehicular ad hoc networks, in: The First International Conference on Availability, Reliability and Security, 2006.
-
-
-
-
19
-
-
46749118465
-
-
M. Raya, J.P. Hubaux, Security aspects of inter-vehicle communications, in: Proceedings of the 5th Swiss Transport Research Conference (STRC 2005), Ascona, Switzerland, 2005.
-
M. Raya, J.P. Hubaux, Security aspects of inter-vehicle communications, in: Proceedings of the 5th Swiss Transport Research Conference (STRC 2005), Ascona, Switzerland, 2005.
-
-
-
-
20
-
-
33745948310
-
-
M. Raya, J.P. Hubaux, The security of vehicular ad hoc networks, in: Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, Alexandria, USA, 2005, pp. 11-21.
-
M. Raya, J.P. Hubaux, The security of vehicular ad hoc networks, in: Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, Alexandria, USA, 2005, pp. 11-21.
-
-
-
-
21
-
-
46749090516
-
-
D. Jungels, M. Raya, P. Papadimitratos, I. Aad, J.P. Hubaux, Certificate revocation in vehicular ad hoc networks, Technical LCA-Report-2006-006, LCA, 2006.
-
D. Jungels, M. Raya, P. Papadimitratos, I. Aad, J.P. Hubaux, Certificate revocation in vehicular ad hoc networks, Technical LCA-Report-2006-006, LCA, 2006.
-
-
-
-
22
-
-
44549083472
-
Pulsing RoQ DDoS attacking and defense scheme in mobile ad hoc networks
-
Ren W. Pulsing RoQ DDoS attacking and defense scheme in mobile ad hoc networks. International Journal of Network Security 4 2 (2007) 227-234
-
(2007)
International Journal of Network Security
, vol.4
, Issue.2
, pp. 227-234
-
-
Ren, W.1
-
23
-
-
0017930809
-
A method for obtaining digital signatures and public key cryptosystems
-
Rivest R.L., Shamir A., and Adleman L. A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM 21 2 (1978) 120-126
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
25
-
-
46749125818
-
Establishing authenticated channels and secure identifiers in ad-hoc networks
-
Sieka B., and Kshemkalyani A.D. Establishing authenticated channels and secure identifiers in ad-hoc networks. International Journal of Network Security 5 1 (2007) 51-61
-
(2007)
International Journal of Network Security
, vol.5
, Issue.1
, pp. 51-61
-
-
Sieka, B.1
Kshemkalyani, A.D.2
-
27
-
-
3042551124
-
-
Y.-M. Tseng, J.-K. Jan, ID-based cryptographic schemes using a non-interactive public-key distribution system, in: Proceedings of the 14th Annual Computer Security Applications Conference (IEEE ACSAC98), Phoenix, Arizona, December 1998, pp. 237-243.
-
Y.-M. Tseng, J.-K. Jan, ID-based cryptographic schemes using a non-interactive public-key distribution system, in: Proceedings of the 14th Annual Computer Security Applications Conference (IEEE ACSAC98), Phoenix, Arizona, December 1998, pp. 237-243.
-
-
-
-
28
-
-
34147173361
-
A survey on peer-to-peer key management for mobile ad hoc networks
-
van der Merwe J., Dawoud D., and Mcdonald S. A survey on peer-to-peer key management for mobile ad hoc networks. ACM Computing Surveys 39 1 (2007) 1-45
-
(2007)
ACM Computing Surveys
, vol.39
, Issue.1
, pp. 1-45
-
-
van der Merwe, J.1
Dawoud, D.2
Mcdonald, S.3
-
29
-
-
25844519837
-
A secure and efficient authentication protocol for anonymous channel in wireless communications
-
Yang C.-C., Tang Y.-L., Wang R.-C., and Yang H.-W. A secure and efficient authentication protocol for anonymous channel in wireless communications. Applied Mathematics and Computation 169 2 (2005) 1431-1439
-
(2005)
Applied Mathematics and Computation
, vol.169
, Issue.2
, pp. 1431-1439
-
-
Yang, C.-C.1
Tang, Y.-L.2
Wang, R.-C.3
Yang, H.-W.4
-
30
-
-
33751529199
-
Securing mobile ad hoc networks with certificateless public keys
-
Zhang Y., Liu W., Lou W., and Fang Y. Securing mobile ad hoc networks with certificateless public keys. IEEE Transactions on Dependable and Secure Computing 3 4 (2006) 386-399
-
(2006)
IEEE Transactions on Dependable and Secure Computing
, vol.3
, Issue.4
, pp. 386-399
-
-
Zhang, Y.1
Liu, W.2
Lou, W.3
Fang, Y.4
|