메뉴 건너뛰기




Volumn 8, Issue 4, 2009, Pages 1974-1983

BAT: A robust signature scheme for vehicular networks using Binary Authentication Tree

Author keywords

Binary authentication tree; Identity based cryptography; Robust; Signature; Vehicular communication

Indexed keywords

BINARY AUTHENTICATION TREE; IDENTITY-BASED CRYPTOGRAPHY; ROBUST; SIGNATURE; VEHICULAR COMMUNICATION;

EID: 67349168446     PISSN: 15361276     EISSN: None     Source Type: Journal    
DOI: 10.1109/T-WC.2008.080280     Document Type: Article
Times cited : (105)

References (35)
  • 7
    • 2942524994 scopus 로고    scopus 로고
    • Location privacy in pervasive computing
    • and
    • A. R. Beresford and F. Stajano "Location privacy in pervasive computing" IEEE Pervasive Computing, vol. 2, No. 1, pp. 46-55, 2003.
    • (2003) IEEE Pervasive Computing , vol.2 , Issue.1 , pp. 46-55
    • Beresford, A.R.1    Stajano, F.2
  • 9
    • 24944472889 scopus 로고    scopus 로고
    • Enhancing location privacy in wireless LAN through disposable interface identifiers: a quantitative analysis
    • and
    • M. Gruteser and D. Grunwald "Enhancing location privacy in wireless LAN through disposable interface identifiers: a quantitative analysis"" in Proc. WMASH'03, 2003.
    • (2003) in Proc. WMASH'03
    • Gruteser, M.1    Grunwald, D.2
  • 10
    • 2542616812 scopus 로고    scopus 로고
    • Quest for personal control over mobile location privacy
    • and
    • Q. He D. Wu and P. Khosla "Quest for personal control over mobile location privacy" IEEE Commun. Mag., vol. 42, No. 5, pp. 130-136, 2004.
    • (2004) IEEE Commun. Mag. , vol.42 , Issue.5 , pp. 130-136
    • He, Q.1    Wu, D.2    Khosla, P.3
  • 11
    • 34247389249 scopus 로고    scopus 로고
    • A framework for location privacy in wireless networks
    • and, in, China
    • Y. C. Hu and H. J. Wang "A framework for location privacy in wireless networks" in Proc. ACM SIGCOMM Asia Workshop, China, 2005.
    • (2005) Proc. ACM SIGCOMM Asia Workshop
    • Hu, Y.C.1    Wang, H.J.2
  • 13
    • 3042594839 scopus 로고    scopus 로고
    • The security and privacy of smart vehicles
    • and
    • J. P. Hubaux S. Capkun and J. Luo "The security and privacy of smart vehicles" IEEE Security and Privacy, vol. 2, No. 3, pp. 49-55, 2004.
    • (2004) IEEE Security and Privacy , vol.2 , Issue.3 , pp. 49-55
    • Hubaux, J.P.1    Capkun, S.2    Luo, J.3
  • 14
    • 33845726678 scopus 로고    scopus 로고
    • Securing vehicular ad hoc networks
    • M. Raya and J. P. Hubaux "Securing vehicular ad hoc networks" J. Computer Security, vol. 15, No. 1, pp. 39-68, 2007. (Pubitemid 46012642)
    • (2007) Journal of Computer Security , vol.15 , Issue.1 , pp. 39-68
    • Raya, M.1    Hubaux, J.-P.2
  • 17
    • 36749076982 scopus 로고    scopus 로고
    • GSIS: A secure and privacy-preserving protocol for vehicular communications
    • DOI 10.1109/TVT.2007.906878
    • X. Lin X. Sun P. H. Ho and X. Shen "GSIS: a secure and p rivacypreserving protocol for vehicular communications" IEEE Trans. Veh. Technol., vol. 56, No. 6, pp. 3442-3456, 2007. (Pubitemid 350201103)
    • (2007) IEEE Transactions on Vehicular Technology , vol.56 , Issue.6 I , pp. 3442-3456
    • Lin, X.1    Sun, X.2    Ho, P.-H.3    Shen, X.4
  • 20
    • 84874324906 scopus 로고    scopus 로고
    • Identity-Based Encryption from the Weil Pairing
    • Advances in Cryptology - CRYPTO 2001
    • D. Boneh and M. Franklin "Identity-based encryption from the Weil pairing" in Proc. Crypto, LNCS, vol. 2139, pp. 213-229, 2001. (Pubitemid 33317917)
    • (2001) LECTURE NOTES IN COMPUTER SCIENCE , Issue.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 21
    • 0035336179 scopus 로고    scopus 로고
    • New explicit conditions of elliptic curve traces for FR-reduction
    • and
    • A. Miyaji M. Nakabayashi and S. Takano "New explicit conditions of elliptic curve traces for FR-reduction" IEICE Trans. Fundamentals, vol. 5, pp. 1234-1243, 2001.
    • (2001) IEICE Trans. Fundamentals , vol.5 , pp. 1234-1243
    • Miyaji, A.1    Nakabayashi, M.2    Takano, S.3
  • 22
    • 84946840347 scopus 로고    scopus 로고
    • Short Signatures from the Weil Pairing
    • Advances in Cryptology - ASIACRYPT 2001
    • D. Boneh B. Lynn and H. Shacham "Short signatures from the Weil pairing" in Proc. Asiacrypt, vol. 2248, pp. 514-532, 2001. (Pubitemid 33371204)
    • (2002) LECTURE NOTES IN COMPUTER SCIENCE , Issue.2248 , pp. 514-532
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 24
    • 51449098979 scopus 로고    scopus 로고
    • An efficient identitybased batch verification scheme for vehicular sensor networks
    • and, in
    • C. Zhang R. Lu X. Lin P. H. Ho and X. Shen "An efficient identitybased batch verification scheme for vehicular sensor networks"" in Proc. IEEE INFOCOM'08, 2008.
    • (2008) Proc. IEEE INFOCOM'08
    • Zhang, C.1    Lu, R.2    Lin, X.3    Ho, P.H.4    Shen, X.5
  • 25
    • 84921021973 scopus 로고
    • Batch RSA
    • in
    • A. Fiat "Batch RSA" in Proc. Crypto, LNCS, vol. 435, pp. 175-185, 1989.
    • (1989) Proc. Crypto, LNCS , vol.435 , pp. 175-185
    • Fiat, A.1
  • 26
    • 35248835575 scopus 로고    scopus 로고
    • Aggregate and Verifiably Encrypted Signatures from Bilinear Maps
    • Advances in Cryptology - EUROCRPYT 2003: International Conference on the Theory and Applications of Cryptographic Techniques Warsaw, Poland, May 4-8, 2003 Proceedings
    • D. Boneh C. Gentry B. Lynn and H. Shacham "Aggregate and verifiably encrypted signatures from bilinear maps" in Proc. Eurocrypt, LNCS, vol. 2656, pp. 416-432, 2003. (Pubitemid 36572190)
    • (2003) LECTURE NOTES IN COMPUTER SCIENCE , Issue.2656 , pp. 416-432
    • Boneh, D.1    Gentry, C.2    Lynn, B.3    Shacham, H.4
  • 29
    • 84957804123 scopus 로고    scopus 로고
    • Identification of bad signatures in batches
    • and, in, LNCS
    • J. Pastuszak D. Michatek J. Pieprzyk and J. Seberry "Identification of bad signatures in batches" in Proc. PKC'00, LNCS, vol. 3958, pp. 28-45, 2000.
    • (2000) Proc. PKC'00 , vol.3958 , pp. 28-45
    • Pastuszak, J.1    Michatek, D.2    Pieprzyk, J.3    Seberry, J.4
  • 31
  • 33
    • 0003735741 scopus 로고    scopus 로고
    • Public Key Cryptography for the Financial Services Industry
    • American National Standard X9.62-2005
    • American National Standard X9.62-2005, Public Key Cryptography for the Financial Services Industry, The Elliptic Curve Digital Signature Algorithm (ECDSA), 2005.
    • (2005) The Elliptic Curve Digital Signature Algorithm (ECDSA)
  • 35
    • 39049090594 scopus 로고    scopus 로고
    • Cooperative security for network coding file distribution
    • and, in
    • C. Gkantsidis and P. Rodriguez "Cooperative security for network coding file distribution" in Proc. IEEE INFOCOM, 2006.
    • (2006) Proc. IEEE INFOCOM
    • Gkantsidis, C.1    Rodriguez, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.