-
2
-
-
33746097415
-
Privacy issues in vehicular ad hoc networks
-
Sep
-
F. Dötzer, "Privacy issues in vehicular ad hoc networks," in Proc. 2nd ACM Workshop Veh. Ad Hoc Netw., Sep. 2006, pp. 197-209.
-
(2006)
Proc. 2nd ACM Workshop Veh. Ad Hoc Netw.
, pp. 197-209
-
-
Dötzer, F.1
-
3
-
-
78650984146
-
IEEE trial-use standard for wireless access in vehicular environments-security services for applications and management messages
-
IEEE Trial-Use Standard for Wireless Access in Vehicular Environments-Security Services for Applications and Management Messages, IEEE Std. 1609.2-2006, 2006.
-
(2006)
IEEE Std.1609.2-2006
-
-
-
4
-
-
59249108565
-
Security certificate revocation list distribution for VANET
-
K. P. Laberteaux, J. J. Haas, and Y. Hu, "Security certificate revocation list distribution for VANET," in Proc. 5th ACM Int. Workshop Veh. Inter-NETw., 2008, pp. 88-89.
-
(2008)
Proc. 5th ACM Int. Workshop Veh. Inter-NETw.
, pp. 88-89
-
-
Laberteaux, K.P.1
Haas, J.J.2
Hu, Y.3
-
5
-
-
59249093973
-
Certificate revocation list distribution in vehicular communication systems
-
P. P. Papadimitratos, G. Mezzour, and J. Hubaux, "Certificate revocation list distribution in vehicular communication systems," in Proc. 5th ACM Int. Workshop Veh. Inter-NETw., 2008, pp. 86-87.
-
(2008)
Proc. 5th ACM Int. Workshop Veh. Inter-NETw.
, pp. 86-87
-
-
Papadimitratos, P.P.1
Mezzour, G.2
Hubaux, J.3
-
6
-
-
51249100419
-
RAISE: An efficient RSU-aided message authentication scheme in vehicular communication networks
-
C. Zhang, X. Lin, R. Lu, and P.-H. Ho, "RAISE: An efficient RSU-aided message authentication scheme in vehicular communication networks," in Proc. ICC, 2008, pp. 1451-1457.
-
(2008)
Proc. ICC
, pp. 1451-1457
-
-
Zhang, C.1
Lin, X.2
Lu, R.3
Ho, P.-H.4
-
7
-
-
32144450457
-
Balancing auditability and privacy in vehicular networks
-
J. Y. Choi, M. Jakobsson, and S. Wetzel, "Balancing auditability and privacy in vehicular networks," in Proc. 1st ACM Int. Workshop Quality Service Security Wireless Mob. Netw., 2005, pp. 79-87.
-
(2005)
Proc. 1st ACM Int. Workshop Quality Service Security Wireless Mob. Netw.
, pp. 79-87
-
-
Choi, J.Y.1
Jakobsson, M.2
Wetzel, S.3
-
8
-
-
34547533155
-
Enforcing privacy using symmetric random key-set in vehicular networks
-
Y. Xi, K. Sha, W. Shi, L. Schwiebert, and T. Zhang, "Enforcing privacy using symmetric random key-set in vehicular networks," in Proc. ISADS, 2007, pp. 344-351.
-
(2007)
Proc. ISADS
, pp. 344-351
-
-
Xi, Y.1
Sha, K.2
Shi, W.3
Schwiebert, L.4
Zhang, T.5
-
9
-
-
37849048533
-
Efficient and robust pseudonymous authentication in VANET
-
G. Calandriello, P. Papadimitratos, J.-P. Hubaux, and A. Lioy, "Efficient and robust pseudonymous authentication in VANET," in Proc. 4th ACM Int. Workshop Veh. Ad Hoc Netw., 2007, pp. 19-28.
-
(2007)
Proc. 4th ACM Int. Workshop Veh. Ad Hoc Netw.
, pp. 19-28
-
-
Calandriello, G.1
Papadimitratos, P.2
Hubaux, J.-P.3
Lioy, A.4
-
10
-
-
48649088209
-
A group signature based secure and privacy-preserving vehicular communication framework
-
J. Guo, J. Baugh, and S. Wang, "A group signature based secure and privacy-preserving vehicular communication framework," in Proc. Mobile Netw. Veh. Environ., 2007, pp. 103-108.
-
(2007)
Proc. Mobile Netw. Veh. Environ.
, pp. 103-108
-
-
Guo, J.1
Baugh, J.2
Wang, S.3
-
11
-
-
51349103067
-
Adaptive privacypreserving authentication in vehicular networks
-
K. Sha, Y. Xi, W. Shi, L. Schwiebert, and T. Zhang, "Adaptive privacypreserving authentication in vehicular networks," in Proc. ChinaCom, 2006, pp. 1-8.
-
(2006)
Proc. ChinaCom
, pp. 1-8
-
-
Sha, K.1
Xi, Y.2
Shi, W.3
Schwiebert, L.4
Zhang, T.5
-
12
-
-
38549175291
-
Secure vehicular communications based on group signature and id-based signature scheme
-
X. Sun, X. Lin, and P.-H. Ho, "Secure vehicular communications based on group signature and id-based signature scheme," in Proc. ICC, 2007, pp. 1539-1545.
-
(2007)
Proc. ICC
, pp. 1539-1545
-
-
Sun, X.1
Lin, X.2
Ho, P.-H.3
-
13
-
-
36749076982
-
GSIS: A secure and privacy-preserving protocol for vehicular communications
-
DOI 10.1109/TVT.2007.906878
-
X. Lin, X. Sun, P.-H. Ho, and X. Shen, "GSIS: A secure and privacypreserving protocol for vehicular communications," IEEE Trans. Veh. Technol., vol.56, no.6, pp. 3442-3456, Nov. 2007. (Pubitemid 350201103)
-
(2007)
IEEE Transactions on Vehicular Technology
, vol.56
, Issue.6 I
, pp. 3442-3456
-
-
Lin, X.1
Sun, X.2
Ho, P.-H.3
Shen, X.4
-
14
-
-
67249107220
-
ECMV: Efficient certificate management scheme for vehicular networks
-
A. Wasef, Y. Jiang, and X. Shen, "ECMV: Efficient certificate management scheme for vehicular networks," in Proc. IEEE GLOBECOM, 2008, pp. 1-5.
-
(2008)
Proc. IEEE GLOBECOM
, pp. 1-5
-
-
Wasef, A.1
Jiang, Y.2
Shen, X.3
-
15
-
-
51349156734
-
ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications
-
R. Lu, X. Lin, H. Zhu, P.-H. Ho, and X. Shen, "ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications," in Proc. INFOCOM, 2008, pp. 1229-1237.
-
(2008)
Proc. INFOCOM
, pp. 1229-1237
-
-
Lu, R.1
Lin, X.2
Zhu, H.3
Ho, P.-H.4
Shen, X.5
-
16
-
-
0038487088
-
Random key predistribution schemes for sensor networks
-
H. Chan, A. Perrig, and D. Song, "Random key predistribution schemes for sensor networks," in Proc. IEEE Symp. Security Privacy, 2003, pp. 197-213.
-
(2003)
Proc. IEEE Symp. Security Privacy
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
18
-
-
84943553152
-
Establishing pairwise keys for secure communication in ad hoc networks: A probabilistic approach
-
S. Zhu, S. Xu, S. Setia, and S. Jajodia, "Establishing pairwise keys for secure communication in ad hoc networks: A probabilistic approach," in Proc. 11th IEEE Int. Conf. Netw. Protocols, 2003, pp. 326-335.
-
(2003)
Proc. 11th IEEE Int. Conf. Netw. Protocols
, pp. 326-335
-
-
Zhu, S.1
Xu, S.2
Setia, S.3
Jajodia, S.4
-
19
-
-
33750258287
-
GKMPAN: An efficient group rekeying scheme for secure multicast in ad-hoc networks
-
S. Zhu, S. Setia, S. Xu, and S. Jajodia, "GKMPAN: An efficient group rekeying scheme for secure multicast in ad-hoc networks," J. Comput. Secur., vol.14, no.4, pp. 301-325, 2006.
-
(2006)
J. Comput. Secur.
, vol.14
, Issue.4
, pp. 301-325
-
-
Zhu, S.1
Setia, S.2
Xu, S.3
Jajodia, S.4
-
20
-
-
51249107509
-
PPGCV: Privacy preserving group communications protocol for vehicular ad hoc networks
-
A. Wasef and X. Shen, "PPGCV: Privacy preserving group communications protocol for vehicular ad hoc networks," in Proc. ICC, 2008, pp. 1458-1463.
-
(2008)
Proc. ICC
, pp. 1458-1463
-
-
Wasef, A.1
Shen, X.2
-
21
-
-
14944372809
-
Detecting and correcting malicious data in VANETs
-
P. Golle, D. Greene, and J. Staddon, "Detecting and correcting malicious data in VANETs," in Proc. 1st ACM Int. Workshop Veh. Ad Hoc Netw., 2004, pp. 29-37.
-
(2004)
Proc. 1st ACM Int. Workshop Veh. Ad Hoc Netw.
, pp. 29-37
-
-
Golle, P.1
Greene, D.2
Staddon, J.3
-
22
-
-
35348977820
-
Eviction of misbehaving and faulty nodes in vehicular networks
-
Oct
-
M. Raya, P. Papadimitratos, I. Aad, D. Jungels, and J.-P. Hubaux, "Eviction of misbehaving and faulty nodes in vehicular networks," IEEE J. Sel. Areas Commun., vol.25, no.8, pp. 1557-1568, Oct. 2007.
-
(2007)
IEEE J. Sel. Areas Commun.
, vol.25
, Issue.8
, pp. 1557-1568
-
-
Raya, M.1
Papadimitratos, P.2
Aad, I.3
Jungels, D.4
Hubaux, J.-P.5
-
23
-
-
70449488661
-
Certificate revocation in vehicular networks
-
Lausanne, Switzerland, Tech. Rep. LCA-Rep.-2006-3006
-
M. Raya, D. Jungels, P. Papadimitratos, I. Aad, and J. P. Hubaux, "Certificate revocation in vehicular networks," Swiss Fed. Inst. Technol., Lausanne, Switzerland, Tech. Rep. LCA-Rep.-2006-3006, 2006.
-
(2006)
Swiss Fed. Inst. Technol.
-
-
Raya, M.1
Jungels, D.2
Papadimitratos, P.3
Aad, I.4
Hubaux, J.P.5
-
25
-
-
23044435711
-
Short signatures from the Weil pairing
-
Sep
-
D. Boneh, B. Lynn, and H. Shacham, "Short signatures from the Weil pairing," J. Cryptol., vol.17, no.4, pp. 297-319, Sep. 2004.
-
(2004)
J. Cryptol.
, vol.17
, Issue.4
, pp. 297-319
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
26
-
-
24144479376
-
Computing the Tate pairing
-
Berlin, Germany: Springer-Verlag
-
M. Scott, "Computing the Tate pairing," in Topics in Cryptology. Berlin, Germany: Springer-Verlag, 2005, pp. 293-304.
-
(2005)
Topics in Cryptology
, pp. 293-304
-
-
Scott, M.1
-
27
-
-
0348003132
-
The state of elliptic curve cryptography
-
Mar
-
N. Koblitz, A. Menezes, and S. Vanstone, "The state of elliptic curve cryptography," Designs Codes Cryptogr., vol. 19, no. 2/3, pp. 173-193, Mar. 2000.
-
(2000)
Designs Codes Cryptogr.
, vol.19
, Issue.2-3
, pp. 173-193
-
-
Koblitz, N.1
Menezes, A.2
Vanstone, S.3
-
28
-
-
0018545449
-
How to share a secret
-
Nov
-
A. Shamir, "How to share a secret," Commun. ACM, vol.22, no.11, pp. 612-613, Nov. 1979.
-
(1979)
Commun. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
29
-
-
0003403663
-
-
[Online]. Available
-
The Network Simulator-ns-2. [Online]. Available: http://nsnam.isi.edu/ nsnam/index.php/User-Information
-
The Network Simulator-ns-2
-
-
-
31
-
-
14944347139
-
Performance evaluation of safety applications over DSRC vehicular ad hoc networks
-
J. Yin, T. ElBatt, G. Yeung, B. Ryu, S. Habermas, H. Krishnan, and T. Talty, "Performance evaluation of safety applications over DSRC vehicular ad hoc networks," in Proc. 1st ACM Int. Workshop Veh. Ad Hoc Netw., 2004, pp. 1-9.
-
(2004)
Proc. 1st ACM Int. Workshop Veh. Ad Hoc Netw.
, pp. 1-9
-
-
Yin, J.1
Elbatt, T.2
Yeung, G.3
Ryu, B.4
Habermas, S.5
Krishnan, H.6
Talty, T.7
-
32
-
-
51449098979
-
An efficient identitybased batch verification scheme for vehicular sensor networks
-
C. Zhang, R. Lu, X. Lin, P.-H. Ho, and X. Shen, "An efficient identitybased batch verification scheme for vehicular sensor networks," in Proc. IEEE INFOCOM, 2008, pp. 246-250.
-
(2008)
Proc. IEEE INFOCOM
, pp. 246-250
-
-
Zhang, C.1
Lu, R.2
Lin, X.3
Ho, P.-H.4
Shen, X.5
-
33
-
-
70450166722
-
New explicit conditions of elliptic curve traces for FR-reductions
-
A. Miyaji, M. Nakabayashi, and S. Takano, "New explicit conditions of elliptic curve traces for FR-reductions," IEIC Tech. Rep., vol.100, no.323, pp. 99-108, 2000.
-
(2000)
IEIC Tech. Rep.
, vol.100
, Issue.323
, pp. 99-108
-
-
Miyaji, A.1
Nakabayashi, M.2
Takano, S.3
-
34
-
-
0142002511
-
The elliptic curve digital signature algorithm (ECDSA)
-
Aug
-
D. Johnson, A. Menezes, and S. Vanstone, "The elliptic curve digital signature algorithm (ECDSA)," Int. J. Inf. Secur., vol.1, no.1, pp. 36-63, Aug. 2001.
-
(2001)
Int. J. Inf. Secur.
, vol.1
, Issue.1
, pp. 36-63
-
-
Johnson, D.1
Menezes, A.2
Vanstone, S.3
|