메뉴 건너뛰기




Volumn , Issue , 2008, Pages 2543-2548

A location privacy preserving authentication scheme in vehicular networks

Author keywords

[No Author keywords available]

Indexed keywords

LOCATION; VEHICLES;

EID: 51649098802     PISSN: 15253511     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/wcnc.2008.447     Document Type: Conference Paper
Times cited : (64)

References (16)
  • 2
    • 33845726678 scopus 로고    scopus 로고
    • Securing vehicular ad hoc networks
    • M. Raya and J.-P. Hubaux, "Securing vehicular ad hoc networks," Journal of Computer Security, Vol. 15, No. 1, pp. 39-68, 2007.
    • (2007) Journal of Computer Security , vol.15 , Issue.1 , pp. 39-68
    • Raya, M.1    Hubaux, J.-P.2
  • 4
    • 33744909327 scopus 로고    scopus 로고
    • H. Wang and A. R. Prasad, Fast authentication for inter-domain handover, In Proc. of Conference on Telecommunications (ICT'04), LNCS of 3124, pp. 973-982, 2004.
    • H. Wang and A. R. Prasad, "Fast authentication for inter-domain handover," In Proc. of Conference on Telecommunications (ICT'04), LNCS of 3124, pp. 973-982, 2004.
  • 5
    • 33744920849 scopus 로고    scopus 로고
    • K. Hong, S. Jung, and S. Felix Wu, A hash-chain based authentication scheme for fast handover in wireless network, In Proc. of the International Workshop on Information Security Applications, LNCS of 3786, pp. 96-107, 2006.
    • K. Hong, S. Jung, and S. Felix Wu, "A hash-chain based authentication scheme for fast handover in wireless network," In Proc. of the International Workshop on Information Security Applications, LNCS of 3786, pp. 96-107, 2006.
  • 7
    • 33846307093 scopus 로고    scopus 로고
    • Privacy-enhanced, Attack-resilient Access Control in Pervasive Environments with Optional Context Authentication Capability
    • K. Ren and W. Lou, "Privacy-enhanced, Attack-resilient Access Control in Pervasive Environments with Optional Context Authentication Capability," ACM Mobile Networks and Applications, Vol. 12, pp. 79-92, 2007.
    • (2007) ACM Mobile Networks and Applications , vol.12 , pp. 79-92
    • Ren, K.1    Lou, W.2
  • 8
    • 23044435711 scopus 로고    scopus 로고
    • Short signature from the weil pairing
    • D. Boneh, H. Shacham, and B. Lynn, "Short signature from the weil pairing" Journal of Cryptology, Vol, 17, No. 4, pp. 297-319, 2004.
    • (2004) Journal of Cryptology , vol.17 , Issue.4 , pp. 297-319
    • Boneh, D.1    Shacham, H.2    Lynn, B.3
  • 9
    • 0001604533 scopus 로고
    • Blind signatures for untraceable payments
    • D. Chaum, "Blind signatures for untraceable payments," In Proc. of Advance in Cryptology, pp. 199-203, 1982.
    • (1982) Proc. of Advance in Cryptology , pp. 199-203
    • Chaum, D.1
  • 10
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R. L. Rivest, A. Shamir, L. A. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Communications of the ACM, Vol. 21, No. 2, pp. 120-126, 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.A.3
  • 11
    • 84874800178 scopus 로고
    • A public-key cryptosystem and a signature scheme based on discrete logarithms
    • T. ElGamal, "A public-key cryptosystem and a signature scheme based on discrete logarithms," IEEE Transactions on Information Theory, Vol. 31, No. 4, pp. 469-472, 1985.
    • (1985) IEEE Transactions on Information Theory , vol.31 , Issue.4 , pp. 469-472
    • ElGamal, T.1
  • 12
    • 0035336179 scopus 로고    scopus 로고
    • New explicit conditions of elliptic curve traces for FR-reduction
    • A. Miyaji, M. Nakabayashi, and S. Takano, "New explicit conditions of elliptic curve traces for FR-reduction," IEICE Transactions on Fundamentals, Vol. E84-A, pp. 1234-1243, 2001.
    • (2001) IEICE Transactions on Fundamentals , vol.E84-A , pp. 1234-1243
    • Miyaji, A.1    Nakabayashi, M.2    Takano, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.