-
1
-
-
57449105235
-
Secure vehicular communication systems: Design and architecture
-
Nov.
-
P. Papadimitratos, L. Buttyan, T. Holczer, E. Schoch, J. Freudiger, M. Raya, Z. Ma, F. Kargl, A. Kung, and J.-P. Hubaux, "Secure vehicular communication systems: Design and architecture," IEEE Communications, Nov. 2008.
-
(2008)
IEEE Communications
-
-
Papadimitratos, P.1
Buttyan, L.2
Holczer, T.3
Schoch, E.4
Freudiger, J.5
Raya, M.6
Ma, Z.7
Kargl, F.8
Kung, A.9
Hubaux, J.-P.10
-
2
-
-
62949127465
-
IEEE trial-use standard for wireless access in vehicular environments - Security services for applications and management messages
-
IEEE P1609.2 working group
-
IEEE P1609.2 working group, "IEEE trial-use standard for wireless access in vehicular environments - security services for applications and management messages," IEEE Std 1609.2-2006, 2006.
-
(2006)
IEEE Std 1609.2-2006
-
-
-
3
-
-
70849118349
-
Privacy requirements in vehicular communication systems
-
F. Schaub, Z. Ma, and F. Kargl, "Privacy requirements in vehicular communication systems," in Intl. Symposium on Secure Computing (SecureCom09), IEEE PASSAT09, Vancouver, Canada, August 2009.
-
Intl. Symposium on Secure Computing (SecureCom09), IEEE PASSAT09, Vancouver, Canada, August 2009
-
-
Schaub, F.1
Ma, Z.2
Kargl, F.3
-
4
-
-
44949112970
-
Cross-layer privacy enhancement and non-repudiation in vehicular communication
-
F. Armknecht, A. Festag, D. Westhoff, and K. Zeng, "Cross-layer privacy enhancement and non-repudiation in vehicular communication," in 4th Workshop on Mobile Ad-Hoc Networks (WMAN07), March 2007.
-
4th Workshop on Mobile Ad-Hoc Networks (WMAN07), March 2007
-
-
Armknecht, F.1
Festag, A.2
Westhoff, D.3
Zeng, K.4
-
5
-
-
56749160366
-
Self-certified sybil-free pseudonyms
-
L. A. Martucci, M. Kohlweiss, C. Andersson, and A. Panchenko, "Self-certified sybil-free pseudonyms," in Proc. 1st ACM Conf. on Wireless Network Security (WISEC 2008), USA, March 2008, pp. 154-159.
-
Proc. 1st ACM Conf. on Wireless Network Security (WISEC 2008), USA, March 2008
, pp. 154-159
-
-
Martucci, L.A.1
Kohlweiss, M.2
Andersson, C.3
Panchenko, A.4
-
6
-
-
77955017757
-
Revocable anonymous authenticated inter-vehicle communication (SRAAC)
-
L. Fischer, A. Aijaz, C. Eckert, and D. Vogt, "Revocable anonymous authenticated inter-vehicle communication (SRAAC)," in Embedded Security in Cars (ESCAR 2006), Berlin, Germany, 2006.
-
Embedded Security in Cars (ESCAR 2006), Berlin, Germany, 2006
-
-
Fischer, L.1
Aijaz, A.2
Eckert, C.3
Vogt, D.4
-
7
-
-
38049128453
-
Blind signature systems
-
US Patent 4759063, July
-
D. Chaum, "Blind signature systems," US Patent 4759063, July 1988.
-
(1988)
-
-
Chaum, D.1
-
8
-
-
58049149051
-
A novel untraceable blind signature based on elliptic curve discrete logarithm problem
-
D. Jena, S. K. Jena, and B. Majhi, "A novel untraceable blind signature based on elliptic curve discrete logarithm problem," IJCSNS, vol. 7, no. 6, pp. 269-275, 2007.
-
(2007)
IJCSNS
, vol.7
, Issue.6
, pp. 269-275
-
-
Jena, D.1
Jena, S.K.2
Majhi, B.3
-
9
-
-
1442310343
-
Commitment schemes and zero-knowledge protocols
-
I. Damgard, "Commitment schemes and zero-knowledge protocols," LNCS, vol. 1561, pp. 63-86, 1999.
-
(1999)
LNCS
, vol.1561
, pp. 63-86
-
-
Damgard, I.1
-
10
-
-
0005063385
-
Onion routing for anonymous and private internet connections
-
D. Goldschlag, M. Reed, and P. Syverson, "Onion routing for anonymous and private internet connections," Comm. of the ACM, vol. 42, no. 2, pp. 39-41, 1999.
-
(1999)
Comm. of the ACM
, vol.42
, Issue.2
, pp. 39-41
-
-
Goldschlag, D.1
Reed, M.2
Syverson, P.3
-
11
-
-
84929273746
-
Untraceable electronic cash
-
New York: Springer
-
D. Chaum, A. Fiat, and M. Naor, "Untraceable electronic cash," in Proc. on Advances in Cryptology. New York: Springer, 1990, pp. 319-327.
-
(1990)
Proc. on Advances in Cryptology
, pp. 319-327
-
-
Chaum, D.1
Fiat, A.2
Naor, M.3
-
12
-
-
85034837254
-
Secret sharing homomorphisms: Keeping shares of a secret secret (extended abstract)
-
CRYPTO '86, ser. Springer, August
-
J. C. Benaloh, "Secret sharing homomorphisms: Keeping shares of a secret secret (extended abstract)," in CRYPTO '86, ser. LNCS, vol. 263. Springer, August 1986, pp. 251-260.
-
(1986)
LNCS
, vol.263
, pp. 251-260
-
-
Benaloh, J.C.1
-
13
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
T. ElGamal, "A public key cryptosystem and a signature scheme based on discrete logarithms," IEEE Trans. on Inf. Theory, vol. 31, no. 4, pp. 469-472, 1985.
-
(1985)
IEEE Trans. on Inf. Theory
, vol.31
, Issue.4
, pp. 469-472
-
-
ElGamal, T.1
-
14
-
-
0003038453
-
An introduction to shared secret and/or shared control schemes and their application
-
IEEE Press
-
G. J. Simmons, "An introduction to shared secret and/or shared control schemes and their application," in Contemporary Cryptology. IEEE Press, 1992, pp. 441-498.
-
(1992)
Contemporary Cryptology
, pp. 441-498
-
-
Simmons, G.J.1
-
15
-
-
84945124606
-
Multiparty computation from threshold homomorphic encryption
-
EUROCRYPT, ser. Springer
-
R. Cramer, I. Damgård, and J. B. Nielsen, "Multiparty computation from threshold homomorphic encryption," in EUROCRYPT, ser. LNCS, vol. 2045. Springer, 2001, pp. 280-299.
-
(2001)
LNCS
, vol.2045
, pp. 280-299
-
-
Cramer, R.1
Damgård, I.2
Nielsen, J.B.3
|