-
2
-
-
34247393740
-
Fleetnet: platform for inter-vehicle communications
-
and, in, Hamburg, Germany
-
W. Franz C. Wagner C. Maihofer and H. Hartenstein "Fleetnet: platform for inter-vehicle communications" in Proc. 1st Intl. Workshop on Intelligent Transportation, Hamburg, Germany, 2004.
-
(2004)
Proc. 1st Intl. Workshop on Intelligent Transportation
-
-
Franz, W.1
Wagner, C.2
Maihofer, C.3
Hartenstein, H.4
-
5
-
-
32144446861
-
Security issues in a future vehicular network
-
and, in
-
M. E. Zarki S. Mehrotra G. Tsudik and N. Venkatasubramanian "Security issues in a future vehicular network" in Proc. European Wireless, Next Generation Wireless Networks, vol. 1, pp. 270-274, 2002.
-
(2002)
Proc. European Wireless, Next Generation Wireless Networks
, vol.1
, pp. 270-274
-
-
Zarki, M.E.1
Mehrotra, S.2
Tsudik, G.3
Venkatasubramanian, N.4
-
6
-
-
0036992249
-
Framework for security and privacy in automotive telematics
-
and, in
-
S. Duri M. Gruteser X. Liu P. Moskowitz R. Perez and J.-M. Tang "Framework for security and privacy in automotive telematics" in Proc. 2nd International Workshop on placeMobile Commerce, pp. 25-32, 2002.
-
(2002)
Proc. 2nd International Workshop on placeMobile Commerce
, pp. 25-32
-
-
Duri, S.1
Gruteser, M.2
Liu, X.3
Moskowitz, P.4
Perez, R.5
Tang, J.-M.6
-
7
-
-
2942524994
-
Location privacy in pervasive computing
-
and
-
A. R. Beresford and F. Stajano "Location privacy in pervasive computing" IEEE Pervasive Computing, vol. 2, No. 1, pp. 46-55, 2003.
-
(2003)
IEEE Pervasive Computing
, vol.2
, Issue.1
, pp. 46-55
-
-
Beresford, A.R.1
Stajano, F.2
-
9
-
-
24944472889
-
Enhancing location privacy in wireless LAN through disposable interface identifiers: a quantitative analysis
-
and
-
M. Gruteser and D. Grunwald "Enhancing location privacy in wireless LAN through disposable interface identifiers: a quantitative analysis"" in Proc. WMASH'03, 2003.
-
(2003)
in Proc. WMASH'03
-
-
Gruteser, M.1
Grunwald, D.2
-
10
-
-
2542616812
-
Quest for personal control over mobile location privacy
-
and
-
Q. He D. Wu and P. Khosla "Quest for personal control over mobile location privacy" IEEE Commun. Mag., vol. 42, No. 5, pp. 130-136, 2004.
-
(2004)
IEEE Commun. Mag.
, vol.42
, Issue.5
, pp. 130-136
-
-
He, Q.1
Wu, D.2
Khosla, P.3
-
11
-
-
34247389249
-
A framework for location privacy in wireless networks
-
and, in, China
-
Y. C. Hu and H. J. Wang "A framework for location privacy in wireless networks" in Proc. ACM SIGCOMM Asia Workshop, China, 2005.
-
(2005)
Proc. ACM SIGCOMM Asia Workshop
-
-
Hu, Y.C.1
Wang, H.J.2
-
13
-
-
3042594839
-
The security and privacy of smart vehicles
-
and
-
J. P. Hubaux S. Capkun and J. Luo "The security and privacy of smart vehicles" IEEE Security and Privacy, vol. 2, No. 3, pp. 49-55, 2004.
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.3
, pp. 49-55
-
-
Hubaux, J.P.1
Capkun, S.2
Luo, J.3
-
14
-
-
33845726678
-
Securing vehicular ad hoc networks
-
M. Raya and J. P. Hubaux "Securing vehicular ad hoc networks" J. Computer Security, vol. 15, No. 1, pp. 39-68, 2007. (Pubitemid 46012642)
-
(2007)
Journal of Computer Security
, vol.15
, Issue.1
, pp. 39-68
-
-
Raya, M.1
Hubaux, J.-P.2
-
17
-
-
36749076982
-
GSIS: A secure and privacy-preserving protocol for vehicular communications
-
DOI 10.1109/TVT.2007.906878
-
X. Lin X. Sun P. H. Ho and X. Shen "GSIS: a secure and p rivacypreserving protocol for vehicular communications" IEEE Trans. Veh. Technol., vol. 56, No. 6, pp. 3442-3456, 2007. (Pubitemid 350201103)
-
(2007)
IEEE Transactions on Vehicular Technology
, vol.56
, Issue.6 I
, pp. 3442-3456
-
-
Lin, X.1
Sun, X.2
Ho, P.-H.3
Shen, X.4
-
20
-
-
84874324906
-
Identity-Based Encryption from the Weil Pairing
-
Advances in Cryptology - CRYPTO 2001
-
D. Boneh and M. Franklin "Identity-based encryption from the Weil pairing" in Proc. Crypto, LNCS, vol. 2139, pp. 213-229, 2001. (Pubitemid 33317917)
-
(2001)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
21
-
-
0035336179
-
New explicit conditions of elliptic curve traces for FR-reduction
-
and
-
A. Miyaji M. Nakabayashi and S. Takano "New explicit conditions of elliptic curve traces for FR-reduction" IEICE Trans. Fundamentals, vol. 5, pp. 1234-1243, 2001.
-
(2001)
IEICE Trans. Fundamentals
, vol.5
, pp. 1234-1243
-
-
Miyaji, A.1
Nakabayashi, M.2
Takano, S.3
-
22
-
-
84946840347
-
Short Signatures from the Weil Pairing
-
Advances in Cryptology - ASIACRYPT 2001
-
D. Boneh B. Lynn and H. Shacham "Short signatures from the Weil pairing" in Proc. Asiacrypt, vol. 2248, pp. 514-532, 2001. (Pubitemid 33371204)
-
(2002)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.2248
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
24
-
-
51449098979
-
An efficient identitybased batch verification scheme for vehicular sensor networks
-
and, in
-
C. Zhang R. Lu X. Lin P. H. Ho and X. Shen "An efficient identitybased batch verification scheme for vehicular sensor networks"" in Proc. IEEE INFOCOM'08, 2008.
-
(2008)
Proc. IEEE INFOCOM'08
-
-
Zhang, C.1
Lu, R.2
Lin, X.3
Ho, P.H.4
Shen, X.5
-
25
-
-
84921021973
-
Batch RSA
-
in
-
A. Fiat "Batch RSA" in Proc. Crypto, LNCS, vol. 435, pp. 175-185, 1989.
-
(1989)
Proc. Crypto, LNCS
, vol.435
, pp. 175-185
-
-
Fiat, A.1
-
26
-
-
35248835575
-
Aggregate and Verifiably Encrypted Signatures from Bilinear Maps
-
Advances in Cryptology - EUROCRPYT 2003: International Conference on the Theory and Applications of Cryptographic Techniques Warsaw, Poland, May 4-8, 2003 Proceedings
-
D. Boneh C. Gentry B. Lynn and H. Shacham "Aggregate and verifiably encrypted signatures from bilinear maps" in Proc. Eurocrypt, LNCS, vol. 2656, pp. 416-432, 2003. (Pubitemid 36572190)
-
(2003)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.2656
, pp. 416-432
-
-
Boneh, D.1
Gentry, C.2
Lynn, B.3
Shacham, H.4
-
28
-
-
38049146172
-
Batch verification of short signatures
-
and, in
-
J. Camenisch S. Hohenberger and M. Pedersen "Batch verification of short signatures" in Proc. EUROCRYPT, LNCS, vol. 4514, pp. 246-263, 2007.
-
(2007)
Proc. EUROCRYPT, LNCS
, vol.4514
, pp. 246-263
-
-
Camenisch, J.1
Hohenberger, S.2
Pedersen, M.3
-
29
-
-
84957804123
-
Identification of bad signatures in batches
-
and, in, LNCS
-
J. Pastuszak D. Michatek J. Pieprzyk and J. Seberry "Identification of bad signatures in batches" in Proc. PKC'00, LNCS, vol. 3958, pp. 28-45, 2000.
-
(2000)
Proc. PKC'00
, vol.3958
, pp. 28-45
-
-
Pastuszak, J.1
Michatek, D.2
Pieprzyk, J.3
Seberry, J.4
-
31
-
-
67349225365
-
-
Vehicular Environments - Security Services for Applications and Management Messages, July
-
IEEE Standard 1609.2 - IEEE Trial-Use Standard for Wireless Access in Vehicular Environments - Security Services for Applications and Management Messages, July, 2006.
-
(2006)
IEEE Standard 1609.2 - IEEE Trial-Use Standard for Wireless Access in
-
-
-
33
-
-
0003735741
-
Public Key Cryptography for the Financial Services Industry
-
American National Standard X9.62-2005
-
American National Standard X9.62-2005, Public Key Cryptography for the Financial Services Industry, The Elliptic Curve Digital Signature Algorithm (ECDSA), 2005.
-
(2005)
The Elliptic Curve Digital Signature Algorithm (ECDSA)
-
-
-
35
-
-
39049090594
-
Cooperative security for network coding file distribution
-
and, in
-
C. Gkantsidis and P. Rodriguez "Cooperative security for network coding file distribution" in Proc. IEEE INFOCOM, 2006.
-
(2006)
Proc. IEEE INFOCOM
-
-
Gkantsidis, C.1
Rodriguez, P.2
|