-
1
-
-
33845726678
-
Securing vehicular ad hoc networks
-
M. Raya and J. P. Hubaux, "Securing vehicular ad hoc networks", Journal of Computer Security, Vol. 15. No. 1, pp. 39-68, 2007.
-
(2007)
Journal of Computer Security
, vol.15
, Issue.1
, pp. 39-68
-
-
Raya, M.1
Hubaux, J.P.2
-
2
-
-
42549130522
-
Roadside-aided routing (RAR) in vehicular networks
-
Istanbul, Turkey, June
-
Y. Peng. Z. Abichar, and J. M. Chang, "Roadside-aided routing (RAR) in vehicular networks", in Proc. IEEE ICC 2006, Vol. 8, pp. 3602-3607, Istanbul, Turkey, June 2006.
-
(2006)
Proc. IEEE ICC 2006
, vol.8
, pp. 3602-3607
-
-
Peng, Y.1
Abichar, Z.2
Chang, J.M.3
-
3
-
-
14944372809
-
Detecting and correcting malicious data in VANETs
-
October
-
P. Golle. D. Greene, and J. Staddon, "Detecting and correcting malicious data in VANETs", in Proc. ACM VANET 2004, pp. 29-37, October 2004.
-
(2004)
Proc. ACM VANET 2004
, pp. 29-37
-
-
Golle, P.1
Greene, D.2
Staddon, J.3
-
4
-
-
3042594839
-
The security and privacy of smart vehicles
-
J. P. Hubaux, S. Capkun, and J. Luo, "The security and privacy of smart vehicles", IEEE Security and Privacy Magazine, Vol. 2, No. 3, pp. 49-55, 2004.
-
(2004)
IEEE Security and Privacy Magazine
, vol.2
, Issue.3
, pp. 49-55
-
-
Hubaux, J.P.1
Capkun, S.2
Luo, J.3
-
5
-
-
51249100419
-
RAISE: An efficient rsu-aided message authentication scheme in vehicular communication networks
-
Beijing, China, May 19-23
-
C. Zhang, X. Lin, R. Lu and P.-H. Ho, "RAISE: an efficient rsu-aided message authentication scheme in vehicular communication networks", in Proc. IEEE ICC 2008, Beijing, China, May 19-23, 2008.
-
(2008)
Proc. IEEE ICC 2008
-
-
Zhang, C.1
Lin, X.2
Lu, R.3
Ho, P.-H.4
-
6
-
-
0035789227
-
Medium access and radio resource management for ad hoc networks based on UTRA TDD
-
October
-
M. Lott. R. Halfmann. E. Schultz, and M. Radimirsch, "Medium access and radio resource management for ad hoc networks based on UTRA TDD", in Proc ACM MobiHoc 2001. pp. 76-86, October 2001.
-
(2001)
Proc ACM MobiHoc
, pp. 76-86
-
-
Lott, M.1
Halfmann, R.2
Schultz, E.3
Radimirsch, M.4
-
7
-
-
34147115010
-
Medium access control protocol design for vehicle-vehicle safety messages
-
Q. Xu, T. Mak, J. Ko, and R. Sengupta, "Medium access control protocol design for vehicle-vehicle safety messages", IEEE Transaction on Vehicular Technology, Vol. 56, No. 2, pp. 499-518, 2007.
-
(2007)
IEEE Transaction on Vehicular Technology
, vol.56
, Issue.2
, pp. 499-518
-
-
Xu, Q.1
Mak, T.2
Ko, J.3
Sengupta, R.4
-
10
-
-
33746373934
-
A novel privacy preserving authentication and access control scheme in pervasive computing environments
-
July
-
K. Ren, W. Lou, R. H. Deng, and K. Kim, "A novel privacy preserving authentication and access control scheme in pervasive computing environments", IEEE Transaction on Vehicular Technology, Vol. 55, No. 4, pp. 1373-1384, July 2006.
-
(2006)
IEEE Transaction on Vehicular Technology
, vol.55
, Issue.4
, pp. 1373-1384
-
-
Ren, K.1
Lou, W.2
Deng, R.H.3
Kim, K.4
-
11
-
-
51349126104
-
Security in vehicular ad hoc networks
-
to appear
-
X. Lin, R. Lu, C. Zhang, H. Zhu, P.-H. Ho and X. Shen, "Security in vehicular ad hoc networks". IEEE Communications Magazine, to appear.
-
IEEE Communications Magazine
-
-
Lin, X.1
Lu, R.2
Zhang, C.3
Zhu, H.4
Ho, P.-H.5
Shen, X.6
-
12
-
-
36048991109
-
Adaptive privacy-preserving authentication in vehicular networks
-
Beijing. China, October
-
K. Sha, Y. Xi, W. Shi, L. Schwiebert, and T. Zhang, "Adaptive privacy-preserving authentication in vehicular networks", in Prof, of Communications and Networking in China, 2006. ChinaCom 2006, pp. 1-8, Beijing. China, October 2006.
-
(2006)
Prof, of Communications and Networking in China, 2006. ChinaCom 2006
, pp. 1-8
-
-
Sha, K.1
Xi, Y.2
Shi, W.3
Schwiebert, L.4
Zhang, T.5
-
13
-
-
34547533155
-
Enforcing privacy using symmetric random key-set in vehicular networks
-
Sedona AZ, March
-
Y. Xi, K. Sha, W. Shi. L. Schwiebert, and T. Zhang, "Enforcing privacy using symmetric random key-set in vehicular networks", in Prof. of the 8th International Symposium on Autonomous Decentmlized Systems (ISADS 2007), pp. 344-351. Sedona AZ, March 2007.
-
(2007)
Prof. of the 8th International Symposium on Autonomous Decentmlized Systems (ISADS 2007)
, pp. 344-351
-
-
Xi, Y.1
Sha, K.2
Shi, W.3
Schwiebert, L.4
Zhang, T.5
-
14
-
-
36749076982
-
GSIS: A secure and privacy preserving protocol for vehicular communications
-
X. Lin, X. Sun, P. H. Ho, and X. Shen, "GSIS: a secure and privacy preserving protocol for vehicular communications", IEEE Transaction on Vehicular Technology, Vol. 56, No. 6, pp. 3442-3456, 2007.
-
(2007)
IEEE Transaction on Vehicular Technology
, vol.56
, Issue.6
, pp. 3442-3456
-
-
Lin, X.1
Sun, X.2
Ho, P.H.3
Shen, X.4
-
15
-
-
84874324906
-
Identity-based encryption from the Weil pairing
-
Advances in Cryptology, CRYPTO 2001, Springer-Verlag
-
D. Boneh and M. Franklin, "Identity-based encryption from the Weil pairing", in Advances in Cryptology - CRYPTO 2001, LNCS 2139. pp. 213-229, Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
16
-
-
85024290278
-
Group signatures
-
Advances in Ciyptology, EUROCRYPT 1991, Springer-Verlag
-
D. Chaum and E. van Heyst, "Group signatures", in Advances in Ciyptology - EUROCRYPT 1991, LNCS 547, pp. 257-265, Springer-Verlag, 1991.
-
(1991)
LNCS
, vol.547
, pp. 257-265
-
-
Chaum, D.1
van Heyst, E.2
-
17
-
-
35048887476
-
Short group signatures
-
Advances in Ciyptology, CRYPTO 2004, Springer-Verlag
-
D. Boneh, X. Boyen, and H. Shacham, "Short group signatures", in Advances in Ciyptology - CRYPTO 2004, LNCS 3152, pp. 41-55, Springer-Verlag, 2004.
-
(2004)
LNCS
, vol.3152
, pp. 41-55
-
-
Boneh, D.1
Boyen, X.2
Shacham, H.3
-
19
-
-
0035336179
-
New explicit conditions of elliptic curve traces for FR-reduction
-
A. Miyaji, M. Nakabayashi, and S. Takano, "New explicit conditions of elliptic curve traces for FR-reduction", IEICE Transactions on Fundamentals, Vol. E84-A. No. 5, pp. 1234-123, 2001.
-
(2001)
IEICE Transactions on Fundamentals
, vol.E84-A
, Issue.5
, pp. 1234-2123
-
-
Miyaji, A.1
Nakabayashi, M.2
Takano, S.3
-
20
-
-
51349160082
-
-
B. Schneier, Applied Cryptography (2nd), John Wiley: New York, 1996.
-
B. Schneier, Applied Cryptography (2nd), John Wiley: New York, 1996.
-
-
-
-
21
-
-
14844309671
-
Group signatures with verifier-local revocation
-
Washington, D.C, USA. October
-
D. Boneh and H. Shacham, "Group signatures with verifier-local revocation", in Proc. of the 11'th ACM conference on Computer and Communications Security (CCS) 2004, pp. 168-177, Washington, D.C, USA. October 2004.
-
(2004)
Proc. of the 11'th ACM conference on Computer and Communications Security (CCS)
, pp. 168-177
-
-
Boneh, D.1
Shacham, H.2
-
22
-
-
34247350456
-
-
U.S. Department of Transportation, National Highway Traffic Safety Administration, Final Report. Appendix H:WAVE/DSRC Security, April
-
U.S. Department of Transportation, National Highway Traffic Safety Administration, Vehicle Safety Communications Project, Final Report. Appendix H:WAVE/DSRC Security, April 2006.
-
(2006)
Vehicle Safety Communications Project
-
-
-
23
-
-
0000901529
-
Security arguments for digital signatures and blind signatures
-
D. Pointcheval and J. Stern, "Security arguments for digital signatures and blind signatures". Journal of Cryptology, Vol. 13. No. 3, pp. 361-396. 2000.
-
(2000)
Journal of Cryptology
, vol.13
, Issue.3
, pp. 361-396
-
-
Pointcheval, D.1
Stern, J.2
|