-
1
-
-
33845726678
-
Securing vehicular ad hoc networks
-
Jan.
-
M. Raya and J.-P. Hubaux, "Securing vehicular ad hoc networks," J. Comput. Security, vol.15, no.1, pp. 39-68, Jan. 2007.
-
(2007)
J. Comput. Security
, vol.15
, Issue.1
, pp. 39-68
-
-
Raya, M.1
Hubaux, J.-P.2
-
2
-
-
33746097415
-
Privacy issues in vehicular ad hoc networks
-
Sep.
-
F. Dötzer, "Privacy issues in vehicular ad hoc networks," in Proc. 2nd ACM Workshop Veh. Ad Hoc Netw., Sep. 2006, pp. 197-209.
-
(2006)
Proc. 2nd ACM Workshop Veh. Ad Hoc Netw.
, pp. 197-209
-
-
Dötzer, F.1
-
3
-
-
63749123999
-
Privacy and identity management for vehicular communication systems: A position paper
-
Zurich, Switzerland, Jul.
-
P. Papadimitratos, A. Kung, J. P. Hubaux, and F. Kargl, "Privacy and identity management for vehicular communication systems: A position paper," in Proc. Workshop Standards Privacy User-Centric Identity Manage., Zurich, Switzerland, Jul. 2006.
-
(2006)
Proc. Workshop Standards Privacy User-Centric Identity Manage.
-
-
Papadimitratos, P.1
Kung, A.2
Hubaux, J.P.3
Kargl, F.4
-
4
-
-
57049149967
-
CARAVAN: Providing location privacy for VANET
-
Nov.
-
K. Sampigethaya, L. Huang, M. Li, R. Poovendran, K. Matsuura, and K. Sezaki, "CARAVAN: Providing location privacy for VANET," in Proc. ESCAR, Nov. 2005.
-
(2005)
Proc. ESCAR
-
-
Sampigethaya, K.1
Huang, L.2
Li, M.3
Poovendran, R.4
Matsuura, K.5
Sezaki, K.6
-
5
-
-
3042594839
-
The security and privacy of smart vehicles
-
May/Jun.
-
J. P. Hubaux, "The security and privacy of smart vehicles," IEEE Security Privacy, vol.2, no.3, pp. 49-55, May/Jun. 2004.
-
(2004)
IEEE Security Privacy
, vol.2
, Issue.3
, pp. 49-55
-
-
Hubaux, J.P.1
-
6
-
-
4544241048
-
IEEE 802.11 roaming and authentication in wireless LAN/cellular mobile networks
-
Aug.
-
M. Shi, X. Shen, and J. Mark, "IEEE 802.11 roaming and authentication in wireless LAN/cellular mobile networks," Wireless Commun., vol.11, no.4, pp. 66-75, Aug. 2004.
-
(2004)
Wireless Commun
, vol.11
, Issue.4
, pp. 66-75
-
-
Shi, M.1
Shen, X.2
Mark, J.3
-
7
-
-
36749002169
-
Mutual authentication and key exchange protocols for roaming services in wireless mobile networks
-
Sep.
-
Y. Jiang, C. Lin, X. Shen, and M. Shi, "Mutual authentication and key exchange protocols for roaming services in wireless mobile networks," IEEE Trans. Wireless Commun., vol.5, no.9, pp. 2569-2577, Sep. 2006.
-
(2006)
IEEE Trans. Wireless Commun.
, vol.5
, Issue.9
, pp. 2569-2577
-
-
Jiang, Y.1
Lin, C.2
Shen, X.3
Shi, M.4
-
9
-
-
77249101939
-
-
5.9 GHz DSRC. [Online]. Available
-
5.9 GHz DSRC. [Online]. Available: http://grouper.ieee.org/groups/scc32/ dsrc/index.html
-
-
-
-
10
-
-
36749076982
-
GSIS: A secure and privacy-preserving protocol for vehicular communications
-
DOI 10.1109/TVT.2007.906878
-
X. Lin, X. Sun, P.-H. Ho, and X. Shen, "GSIS: A secure and privacypreserving protocol for vehicular communications," IEEE Trans. Veh. Technol., vol.56, no.6, pp. 3442-3456, Nov. 2007. (Pubitemid 350201103)
-
(2007)
IEEE Transactions on Vehicular Technology
, vol.56
, Issue.I6
, pp. 3442-3456
-
-
Lin, X.1
Sun, X.2
Ho, P.-H.3
Shen, X.4
-
11
-
-
35048887476
-
Short group signatures
-
D. Boneh, X. Boyen, and H. Shacham, "Short group signatures," in Proc. Crypto, 2004, vol.3152, pp. 41-55.
-
(2004)
Proc. Crypto
, vol.3152
, pp. 41-55
-
-
Boneh, D.1
Boyen, X.2
Shacham, H.3
-
12
-
-
51349156734
-
ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications
-
R. Lu, X. Lin, H. Zhu, P.-H. Ho, and X. Shen, "ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications," in Proc. INFOCOM, 2008, pp. 1229-1237.
-
(2008)
Proc. INFOCOM
, pp. 1229-1237
-
-
Lu, R.1
Lin, X.2
Zhu, H.3
Ho, P.-H.4
Shen, X.5
-
13
-
-
67349168446
-
BAT: A robust signature scheme for vehicular networks using binary authentication tree
-
Apr.
-
Y. Jiang, M. Shi, X. Shen, and C. Lin, "BAT: A robust signature scheme for vehicular networks using binary authentication tree," IEEE Trans. Wireless Commun., vol.8, no.4, pp. 1974-1983, Apr. 2009.
-
(2009)
IEEE Trans. Wireless Commun.
, vol.8
, Issue.4
, pp. 1974-1983
-
-
Jiang, Y.1
Shi, M.2
Shen, X.3
Lin, C.4
-
15
-
-
23044435711
-
Short signatures from the Weil pairing
-
Sep.
-
D. Boneh, B. Lynn, and H. Shacham, "Short signatures from the Weil pairing," J. Cryptol., vol.17, no.4, pp. 297-319, Sep. 2004.
-
(2004)
J. Cryptol.
, vol.17
, Issue.4
, pp. 297-319
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
16
-
-
24144479376
-
Computing the Tate pairing
-
Berlin, Germany: Springer-Verlag
-
M. Scott, "Computing the Tate pairing," in Topics in Cryptology. Berlin, Germany: Springer-Verlag, 2005, pp. 293-304.
-
(2005)
Topics in Cryptology
, pp. 293-304
-
-
Scott, M.1
-
17
-
-
70450166722
-
New explicit conditions of elliptic curve traces for FR-reductions
-
A. Miyaji, M. Nakabayashi, and S. Takano, "New explicit conditions of elliptic curve traces for FR-reductions," IEIC Tech. Rep., vol.100, no.323, pp. 99-108, 2000.
-
(2000)
IEIC Tech. Rep.
, vol.100
, Issue.323
, pp. 99-108
-
-
Miyaji, A.1
Nakabayashi, M.2
Takano, S.3
-
19
-
-
0348003132
-
The state of elliptic curve cryptography
-
Mar.
-
N. Koblitz, A. Menezes, and S. Vanstone, "The state of elliptic curve cryptography," Des. Codes Cryptogr., vol.19, no.2, pp. 173-193, Mar. 2000.
-
(2000)
Des. Codes Cryptogr.
, vol.19
, Issue.2
, pp. 173-193
-
-
Koblitz, N.1
Menezes, A.2
Vanstone, S.3
-
20
-
-
84955604812
-
Algorithms for black-box fields and their application to cryptography
-
D. Boneh and R. Lipton, "Algorithms for black-box fields and their application to cryptography," in Proc. Adv. Cryptol., 1996, pp. 283-297.
-
(1996)
Proc. Adv. Cryptol.
, pp. 283-297
-
-
Boneh, D.1
Lipton, R.2
-
21
-
-
0345490607
-
Certificateless public key cryptography
-
S. Al-Riyami and K. Paterson, "Certificateless public key cryptography," in Proc. Adv. Cryptol., 2003, pp. 452-473.
-
(2003)
Proc. Adv. Cryptol.
, pp. 452-473
-
-
Al-Riyami, S.1
Paterson, K.2
-
22
-
-
33744786523
-
On the security of certificateless signature schemes from Asiacrypt 2003
-
Berlin, Germany: Springer-Verlag
-
X. Huang, W. Susilo, Y. Mu, and F. Zhang, "On the security of certificateless signature schemes from Asiacrypt 2003," in Proc. 4th Int. Conf. CANS, Berlin, Germany: Springer-Verlag, 2005, vol.3810, pp. 13-25.
-
(2005)
Proc. 4th Int. Conf. CANS
, vol.3810
, pp. 13-25
-
-
Huang, X.1
Susilo, W.2
Mu, Y.3
Zhang, F.4
-
23
-
-
59249108565
-
Security certificate revocation list distribution for VANET
-
K. P. Laberteaux, J. J. Haas, and Y. Hu, "Security certificate revocation list distribution for VANET," in Proc. 5th ACM Int. Workshop Veh. Inter- NETw., 2008, pp. 88-89.
-
(2008)
Proc. 5th ACM Int. Workshop Veh. Inter- NETw.
, pp. 88-89
-
-
Laberteaux, K.P.1
Haas, J.J.2
Hu, Y.3
-
24
-
-
0038629626
-
Protecting key exchange and management protocols against resource clogging attacks
-
R. Oppliger, "Protecting key exchange and management protocols against resource clogging attacks," in Proc. JointWorking Conf. Secure Inf. Netw., 1999, pp. 163-175.
-
(1999)
Proc. Joint Working Conf. Secure Inf. Netw.
, pp. 163-175
-
-
Oppliger, R.1
-
25
-
-
76549108979
-
REP: Location privacy for VANETs using random encryption periods
-
DOI: 10.1007/ s11036-009- 0175-184, to be published
-
A. Wasef and X. Shen, "REP: Location privacy for VANETs using random encryption periods," Mobile Netw. Appl. (MONET). DOI: 10.1007/ s11036-009-0175-184, to be published.
-
Mobile Netw. Appl. (MONET)
-
-
Wasef, A.1
Shen, X.2
-
26
-
-
51449098979
-
An efficient identitybased batch verification scheme for vehicular sensor networks
-
C. Zhang, R. Lu, X. Lin, P.-H. Ho, and X. Shen, "An efficient identitybased batch verification scheme for vehicular sensor networks," in Proc. IEEE INFOCOM, 2008, 246-250.
-
(2008)
Proc. IEEE INFOCOM
, pp. 246-250
-
-
Zhang, C.1
Lu, R.2
Lin, X.3
Ho, P.-H.4
Shen, X.5
-
27
-
-
0003403663
-
-
[Online]. Available
-
The network simulator-ns-2. [Online]. Available: http://nsnam.isi.edu/ nsnam/index.php/User Information
-
The Network simulator-ns-2
-
-
-
30
-
-
14944347139
-
Performance evaluation of safety applications over DSRC vehicular ad hoc networks
-
J. Yin, T. El Batt, G. Yeung, B. Ryu, S. Habermas, H. Krishnan, and T. Talty, "Performance evaluation of safety applications over DSRC vehicular ad hoc networks," in Proc. 1st ACM Int. Workshop Veh. Ad Hoc Netw., 2004, pp. 1-9.
-
(2004)
Proc. 1st ACM Int. Workshop Veh. Ad Hoc Netw.
, pp. 1-9
-
-
Yin, J.1
El Batt, T.2
Yeung, G.3
Ryu, B.4
Habermas, S.5
Krishnan, H.6
Talty, T.7
-
31
-
-
0142002511
-
The elliptic curve digital signature algorithm (ECDSA)
-
D. Johnson, A. Menezes, and S. Vanstone, "The elliptic curve digital signature algorithm (ECDSA)," Int. J. Inf. Security, vol.1, no.1, pp. 36- 63, 2001.
-
(2001)
Int. J. Inf. Security
, vol.1
, Issue.1
, pp. 36-63
-
-
Johnson, D.1
Menezes, A.2
Vanstone, S.3
-
32
-
-
67249141008
-
Evaluation of certificate-based authentication in mobile ad hoc networks
-
Apr.
-
K. Sadasivam and T. Yang, "Evaluation of certificate-based authentication in mobile ad hoc networks," in Proc. IASTED NCS, Apr. 2005.
-
(2005)
Proc. IASTED NCS
-
-
Sadasivam, K.1
Yang, T.2
-
33
-
-
77249174687
-
-
[Online]. Available
-
List of U.S. states by area. [Online]. Available: http://www. knowledgerush.com/kr/encyclopedia/List-of-U.S.-states-by-area/
-
List of U.S. States by Area
-
-
-
34
-
-
77249113656
-
-
United States Department of Transportation-Federal Highway Administration. [Online]. Available:
-
United States Department of Transportation-Federal Highway Administration. [Online]. Available: http://www.fhwa.dot.gov/policyinformation/ statistics/2007/hm20m.cfm
-
-
-
-
35
-
-
35248835575
-
Aggregate and verifiably encrypted signatures from bilinear maps
-
D. Boneh, C. Gentry, B. Lynn, and H. Shacham, "Aggregate and verifiably encrypted signatures from bilinear maps," in Proc. Adv. Cryptology- EUROCRYPT, 2003, pp. 416-432.
-
(2003)
Proc. Adv. Cryptology- EUROCRYPT
, pp. 416-432
-
-
Boneh, D.1
Gentry, C.2
Lynn, B.3
Shacham, H.4
-
36
-
-
35148875625
-
Two certificateless aggregate signatures from bilinear maps
-
Z. Gong, Y. Long, X. Hong, and K. Chen, "Two certificateless aggregate signatures from bilinear maps," in Proc. 8th ACIS Int. Conf. SNPD, 2007, vol.3, pp. 188-193.
-
(2007)
Proc. 8th ACIS Int. Conf. SNPD
, vol.3
, pp. 188-193
-
-
Gong, Z.1
Long, Y.2
Hong, X.3
Chen, K.4
-
37
-
-
64049088032
-
A novel anonymous mutual authentication protocol with provable link-layer location privacy
-
Mar.
-
R. Lu, X. Lin, H. Zhu, P. Ho, and X. Shen, "A novel anonymous mutual authentication protocol with provable link-layer location privacy," IEEE Trans. Veh. Technol., vol.58, no.3, pp. 1454-1466, Mar. 2009.
-
(2009)
IEEE Trans. Veh. Technol.
, vol.58
, Issue.3
, pp. 1454-1466
-
-
Lu, R.1
Lin, X.2
Zhu, H.3
Ho, P.4
Shen, X.5
|