-
2
-
-
44349178856
-
Vehicle-infrastructure integration (VII) and safety
-
J.A. Misener. "Vehicle-infrastructure integration (VII) and safety", Intellimotion, Vol. 11, No. 2, pp. 1-3, 2005.
-
(2005)
Intellimotion
, vol.11
, Issue.2
, pp. 1-3
-
-
Misener, J.A.1
-
3
-
-
63149083189
-
-
U.S. Department of Transportation [Online]. Available: [last cited in]
-
U.S. Department of Transportation. "Vehicle infrastructure integration."[Online]. Available: http://www.its.dot.gov/index.htm [last cited in 2007].
-
(2007)
Vehicle Infrastructure Integration
-
-
-
4
-
-
0034476488
-
A survey of intelligent vehicle applications worldwide
-
Dearborn, MI, USA Oct.
-
R. Bishop. "A survey of intelligent vehicle applications worldwide", in Proceedings of the IEEE Intelligent Vehicles Symposium 2000, Dearborn, MI, USA, pp. 25-30, Oct. 2000.
-
(2000)
Proceedings of the IEEE Intelligent Vehicles Symposium 2000
, pp. 25-30
-
-
Bishop, R.1
-
5
-
-
33845726678
-
Securing vehicular ad hoc networks
-
M. Raya, and J. P. Hubaux. "Securing Vehicular Ad Hoc Networks", Journal of Computer Security, Special Issue on Security of Ad Hoc and Sensor Networks, Vol. 15, No. 1, pp. 39-68, 2007.
-
(2007)
Journal of Computer Security, Special Issue on Security of Ad Hoc and Sensor Networks
, vol.15
, Issue.1
, pp. 39-68
-
-
Raya, M.1
Hubaux, J.P.2
-
6
-
-
3042594839
-
The security and privacy of smart vehicles
-
J.P. Hubaux, S. Capkun, and L. Jun. "The Security and Privacy of Smart Vehicles", IEEE Security and Privacy Magazine, Vol. 2, No. 3, pp. 49-55, 2004.
-
(2004)
IEEE Security and Privacy Magazine
, vol.2
, Issue.3
, pp. 49-55
-
-
Hubaux, J.P.1
Capkun, S.2
Jun, L.3
-
7
-
-
36749076982
-
GSIS: A secure and privacy-preserving protocol for vehicular communications
-
6 I DOI 10.1109/TVT.2007.906878
-
X. Lin, X. Sun, P.-H. Ho, and X. Shen. "GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications", IEEE Transactions on Vehicular Technology, vol. 56, Issue 6, pp. 3442-56, 2007. (Pubitemid 350201103)
-
(2007)
IEEE Transactions on Vehicular Technology
, vol.56
, pp. 3442-3456
-
-
Lin, X.1
Sun, X.2
Ho, P.-H.3
Shen, X.4
-
8
-
-
42649121690
-
Security in vehicular ad hoc networks
-
X. Lin, R. Lu, C. Zhang, H. Zhu, P.H. Ho, X. Shen. "Security in Vehicular Ad Hoc Networks", IEEE Communications Magazine, vol. 46, no. 4, pp. 88-95, 2008.
-
(2008)
IEEE Communications Magazine
, vol.46
, Issue.4
, pp. 88-95
-
-
Lin, X.1
Lu, R.2
Zhang, C.3
Zhu, H.4
Ho, P.H.5
Shen, X.6
-
9
-
-
58149123333
-
TSVC: Timed efficient and secure vehicular communications with privacy preserving
-
X. Lin, X. Sun, X. Wang, C. Zhang, P.H. Ho, and X. Shen. "TSVC: Timed Efficient and Secure Vehicular Communications with Privacy Preserving", IEEE Transactions on Wireless Communications, vol. 7, no. 12, pp. 4987-98, 2008.
-
(2008)
IEEE Transactions on Wireless Communications
, vol.7
, Issue.12
, pp. 4987-4998
-
-
Lin, X.1
Sun, X.2
Wang, X.3
Zhang, C.4
Ho, P.H.5
Shen, X.6
-
10
-
-
51349156734
-
ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications
-
Phoenix, Arizona, USA, Apr.
-
R. Lu, X. Lin, Zhu, H. Ho, P.H. and X. Shen, "ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications", The 27th IEEE International Conference on Computer Communications (INFOCOM 2008), Phoenix, Arizona, USA, Apr. 15-17, 2008.
-
(2008)
The 27th IEEE International Conference on Computer Communications (INFOCOM 2008)
, pp. 15-17
-
-
Lu, R.1
Lin, X.2
Zhu, H.3
Ho, P.H.4
Shen, X.5
-
11
-
-
51249100419
-
RAISE: An efficient rsu-aided message authentication scheme in vehicular communication networks
-
Beijing, China, May
-
C. Zhang, X. Lin, R. Lu, and P.H. Ho. RAISE: An Efficient RSU-aided Message Authentication Scheme in Vehicular Communication Networks. IEEE International Conference on Communications (ICC'08), Beijing, China, May, pp. 19-23, 2008.
-
(2008)
IEEE International Conference on Communications (ICC'08)
, pp. 19-23
-
-
Zhang, C.1
Lin, X.2
Lu, R.3
Ho, P.H.4
-
12
-
-
57049129831
-
An efficient message authentication scheme for vehicular communications
-
C. Zhang, X. Lin, R. Lu, P.H. Ho, and X. Shen. "A n Efficient Message Authentication Scheme for Vehicular Communications", IEEE Transactions on Vehicular Technology, vol. 57, no. 6, pp. 3357-68, 2008.
-
(2008)
IEEE Transactions on Vehicular Technology
, vol.57
, Issue.6
, pp. 3357-3368
-
-
Zhang, C.1
Lin, X.2
Lu, R.3
Ho, P.H.4
Shen, X.5
-
13
-
-
34547533155
-
Enforcing privacy using symmetric random key-set in vehicular networks
-
Y. Xi, K. Sha, W. Shi, L. Scnwiebert, and T. Zhang. "Enforcing Privacy Using Symmetric Random Key-Set in Vehicular Networks", Eighth International Symposium on Autonomous Decentralized Systems (ISADS'07), pp. 344-51, 2007.
-
(2007)
Eighth International Symposium on Autonomous Decentralized Systems (ISADS'07)
, pp. 344-351
-
-
Xi, Y.1
Sha, K.2
Shi, W.3
Scnwiebert, L.4
Zhang, T.5
-
14
-
-
33745957362
-
A multi-channel VANET providing concurrent safety and commercial services
-
Cologne, Germany, Sep.
-
T.K. Mak, K.P. Laberteaux, and R. Sengupta. "A Multi-Channel VANET Providing Concurrent Safety and Commercial Services", in Proceedings of 2nd ACM International Workshop on Vehicular Ad Hoc Networks, Cologne, Germany, Sep. pp. 1-9, 2005.
-
(2005)
Proceedings of 2nd ACM International Workshop on Vehicular Ad Hoc Networks
, pp. 1-9
-
-
Mak, T.K.1
Laberteaux, K.P.2
Sengupta, R.3
-
16
-
-
34147115010
-
Medium access control protocol design for vehicle-vehicle safety messages
-
Q. Xu, T. Mak, J. Ko, and R. Sengupta, "Medium Access Control Protocol Design for Vehicle-Vehicle Safety Messages", IEEE Transactions on Vehicular Technology, Vol. 56, No. 2, pp. 499-518, 2007.
-
(2007)
IEEE Transactions on Vehicular Technology
, vol.56
, Issue.2
, pp. 499-518
-
-
Xu, Q.1
Mak, T.2
Ko, J.3
Sengupta, R.4
-
17
-
-
35248866223
-
Certificate-based encryption and the certificate revocation problem
-
Springer
-
C. Gentry. "Certificate-based encryption and the certificate revocation problem", in EUROCRYPT 2003, LNCS 2656, Springer; pp. 272-93, 2003.
-
(2003)
EUROCRYPT 2003, LNCS 2656
, pp. 272-293
-
-
Gentry, C.1
-
18
-
-
77952517225
-
-
Available from:
-
"Dedicated Short Range Communications (5.9 GHz DSRC)", Available from:http://www.leearmstrong.com/DSRC/ DSRCHomeset.htm, 1992.
-
(1992)
-
-
-
19
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
J. Kilian, editor Springer
-
D. Boneh and M.K. Franklin. "Identity-based encryption from the Weil pairing", In J. Kilian, editor, CRYPTO 2001, LNCS 2139, pp. 213-229. Springer, 2001.
-
(2001)
CRYPTO 2001, LNCS 2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.K.2
-
20
-
-
0035336179
-
New explicit conditions of elliptic curve traces for FR-reduction
-
A. Miyaji, M. Nakabayashi, and S. Takano. "New explicit conditions of elliptic curve traces for FR-reduction", IEICE Transactions on Fundamentals, Vol. E84-A, No.5, pp. 1234-43, 2001. (Pubitemid 32486851)
-
(2001)
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
, vol.E84-A
, Issue.5
, pp. 1234-1243
-
-
Miyaji, A.1
Nakabayashi, M.2
Takano, S.3
-
21
-
-
33645598062
-
A certificate-based signature scheme
-
Springer
-
B.G. Kang, J.H. Park, and S.G. Hahn. "A Certificate-Based Signature Scheme", Topics in Cryptology RT-RSA 2004, LNCS 2964, Springer; pp. 99-111, 2004.
-
(2004)
Topics in Cryptology RT-RSA 2004, LNCS 2964
, pp. 99-111
-
-
Kang, B.G.1
Park, J.H.2
Hahn, S.G.3
-
22
-
-
37849024134
-
Certificate-based signature: Security model and efficient construction
-
Springer
-
J. Li, X. Huang, Y. Mu, W. Susilo, and Q. Wu. "Certificate-Based Signature: Security Model and Efficient Construction", EuroPKI 2007. LNCS 4582, Springer; pp. 110-25, 2007.
-
(2007)
EuroPKI 2007. LNCS 4582
, pp. 110-125
-
-
Li, J.1
Huang, X.2
Mu, Y.3
Susilo, W.4
Wu, Q.5
-
23
-
-
52149106742
-
Certificate-based signature schemes without pairings or random oracles
-
Springer
-
J.L. Liu, J. Baek, W. Susilo, and J. Zhou. "Certificate-Based Signature Schemes without Pairings or Random Oracles", ISC 2008, LNCS 5222, Springer; pp. 285-97, 2008.
-
(2008)
ISC 2008, LNCS 5222
, pp. 285-297
-
-
Liu, J.L.1
Baek, J.2
Susilo, W.3
Zhou, J.4
-
24
-
-
34247350456
-
-
U.S. Department of Transportation, National Highway Traffic Safety Administration Final Report. Appendix H: WAVE/DSRC Security
-
U.S. Department of Transportation, National Highway Traffic Safety Administration, "Vehicle Safety Communications Project", Final Report. Appendix H: WAVE/DSRC Security, 2006.
-
(2006)
Vehicle Safety Communications Project
-
-
-
25
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Berlin: Springer-Verlag
-
A. Shamir. "Identity-Based Cryptosystems and Signature Schemes", Crypto 1984, LNCS 196, Berlin: Springer-Verlag; pp. 47-53, 1984.
-
(1984)
Crypto 1984, LNCS 196
, pp. 47-53
-
-
Shamir, A.1
|