메뉴 건너뛰기




Volumn , Issue , 2009, Pages

ASIC: Aggregate signatures and certificates verification scheme for vehicular networks

Author keywords

[No Author keywords available]

Indexed keywords

AGGREGATE SIGNATURE; DEDICATED SHORT RANGE COMMUNICATION; DIGITAL SIGNATURE; HIGH SAFETY; MESSAGE AUTHENTICATION; PERFORMANCE EVALUATION; PUBLIC KEY CERTIFICATES; SECURE COMMUNICATIONS; VEHICULAR AD HOC NETWORKS; VEHICULAR NETWORKS;

EID: 77951572383     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/GLOCOM.2009.5425238     Document Type: Conference Paper
Times cited : (25)

References (20)
  • 1
    • 77951590304 scopus 로고    scopus 로고
    • Online. Available
    • "5.9 GHz DSRC." [Online]. Available: http://grouper.ieee.org/ groups/scc32/dsrc/index.html.
    • 5.9 GHz DSRC
  • 2
    • 51449098979 scopus 로고    scopus 로고
    • An efficient identity-based batch verification scheme for vehicular sensor networks
    • C. Zhang, R. Lu, X. Lin, P.-H. Ho, and X. Shen, "An efficient identity-based batch verification scheme for vehicular sensor networks," Proc. IEEE INFOCOM 2008, pp. 246-250, 2008.
    • (2008) Proc. IEEE INFOCOM 2008 , pp. 246-250
    • Zhang, C.1    Lu, R.2    Lin, X.3    Ho, P.-H.4    Shen, X.5
  • 5
    • 3042594839 scopus 로고    scopus 로고
    • The security and privacy of smart vehicles
    • J. P. Hubaux, "The security and privacy of smart vehicles," IEEE Security and Privacy, vol. 2, pp. 49-55, 2004.
    • (2004) IEEE Security and Privacy , vol.2 , pp. 49-55
    • Hubaux, J.P.1
  • 6
    • 33845726678 scopus 로고    scopus 로고
    • Securing vehicular ad hoc networks
    • M. Raya and J.-P. Hubaux, "Securing vehicular ad hoc networks," Journal of Computer Security, vol. 15, no. 1, pp. 39-68, 2007.
    • (2007) Journal of Computer Security , vol.15 , Issue.1 , pp. 39-68
    • Raya, M.1    Hubaux, J.-P.2
  • 7
    • 51349156734 scopus 로고    scopus 로고
    • ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications
    • R. Lu, X. Lin, H. Zhu, P.-H. Ho, and X. Shen, "ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications," Proc. INFOCOM 2008, pp. 1229-1237, 2008.
    • (2008) Proc. INFOCOM 2008 , pp. 1229-1237
    • Lu, R.1    Lin, X.2    Zhu, H.3    Ho, P.-H.4    Shen, X.5
  • 8
    • 67349168446 scopus 로고    scopus 로고
    • BAT: A robust signature scheme for vehicular networks using binary authentication tree
    • Y. Jiang, M. Shi, X. Shen, and C. Lin, "BAT: a robust signature scheme for vehicular networks using binary authentication tree," IEEE Transactions on Wireless Communications, vol. 8, no. 4, pp. 1974-1983, 2009.
    • (2009) IEEE Transactions on Wireless Communications , vol.8 , Issue.4 , pp. 1974-1983
    • Jiang, Y.1    Shi, M.2    Shen, X.3    Lin, C.4
  • 9
    • 67249107220 scopus 로고    scopus 로고
    • ECMV: Efficient certificate management scheme for vehicular networks
    • A. Wasef, Y. Jiang, and X. Shen, "ECMV: efficient certificate management scheme for vehicular networks," Proc. IEEE GLOBECOM 2008, pp. 1-5, 2008.
    • (2008) Proc. IEEE GLOBECOM 2008 , pp. 1-5
    • Wasef, A.1    Jiang, Y.2    Shen, X.3
  • 11
    • 23044435711 scopus 로고    scopus 로고
    • Short signatures from the Weil pairing
    • D. Boneh, B. Lynn, and H. Shacham, "Short signatures from the Weil pairing," Journal of Cryptology, vol. 17, no. 4, pp. 297-319, 2004.
    • (2004) Journal of Cryptology , vol.17 , Issue.4 , pp. 297-319
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 12
    • 24144479376 scopus 로고    scopus 로고
    • Computing the Tate pairing
    • Springer
    • M. Scott, "Computing the Tate pairing," Topics in Cryptology, Springer, pp. 293-304, 2005.
    • (2005) Topics in Cryptology , pp. 293-304
    • Scott, M.1
  • 14
    • 84955604812 scopus 로고    scopus 로고
    • Algorithms for black-box fields and their application to cryptography
    • D. Boneh and R. Lipton, "Algorithms for black-box fields and their application to cryptography," Proc. Advances in Cryptology - CRYPTO '96, pp. 283-297, 1996.
    • (1996) Proc. Advances in Cryptology - CRYPTO '96 , pp. 283-297
    • Boneh, D.1    Lipton, R.2
  • 18
    • 0003403663 scopus 로고    scopus 로고
    • Online. Available
    • "The network simulator - ns-2." [Online]. Available: http://nsnam.isi.edu/nsnam/index.php/User Information
    • The Network Simulator - ns-2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.