-
1
-
-
33845726678
-
Securing vehicular ad hoc networks
-
M. Raya and J.-P. Hubaux, "Securing vehicular ad hoc networks," Journal of Computer Security, vol. 15, no. 1, pp. 39-68, 2007.
-
(2007)
Journal of Computer Security
, vol.15
, Issue.1
, pp. 39-68
-
-
Raya, M.1
Hubaux, J.-P.2
-
5
-
-
77951590304
-
-
[Online]. Available
-
"5.9 GHz DSRC." [Online]. Available: http://grouper.ieee.org/ groups/scc32/dsrc/index.html.
-
5.9 GHz DSRC
-
-
-
6
-
-
35048887476
-
Short group signatures
-
Proc. Crypto
-
D. Boneh, X. Boyen, and H. Shacham, "Short group signatures," Proc. Crypto, LNCS, vol. 3152, pp. 41-55, 2004.
-
(2004)
LNCS
, vol.3152
, pp. 41-55
-
-
Boneh, D.1
Boyen, X.2
Shacham, H.3
-
7
-
-
36749076982
-
GSIS: A secure and privacy-preserving protocol for vehicular communications
-
X. Lin, X. Sun, P.-H. Ho, and X. Shen, "GSIS: A secure and privacy-preserving protocol for vehicular communications," IEEE Transactions on Vehicular Technology, vol. 56, pp. 3442-3456, 2007.
-
(2007)
IEEE Transactions on Vehicular Technology
, vol.56
, pp. 3442-3456
-
-
Lin, X.1
Sun, X.2
Ho, P.-H.3
Shen, X.4
-
8
-
-
51349156734
-
ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications
-
R. Lu, X. Lin, H. Zhu, P.-H. Ho, and X. Shen, "ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications," Proc. INFOCOM 2008, pp. 1229-1237, 2008.
-
(2008)
Proc. INFOCOM 2008
, pp. 1229-1237
-
-
Lu, R.1
Lin, X.2
Zhu, H.3
Ho, P.-H.4
Shen, X.5
-
9
-
-
37849048533
-
Efficient and robust pseudonymous authentication in VANET
-
G. Calandriello, P. Papadimitratos, J.-P. Hubaux, and A. Lioy, "Efficient and robust pseudonymous authentication in VANET," Proc. 4th ACM international workshop on Vehicular ad hoc networks, pp. 19-28, 2007.
-
(2007)
Proc. 4th ACM International Workshop on Vehicular Ad Hoc Networks
, pp. 19-28
-
-
Calandriello, G.1
Papadimitratos, P.2
Hubaux, J.-P.3
Lioy, A.4
-
11
-
-
23044435711
-
Short signatures from the Weil pairing
-
D. Boneh, B. Lynn, and H. Shacham, "Short signatures from the Weil pairing," Journal of Cryptology, vol. 17, no. 4, pp. 297-319, 2004.
-
(2004)
Journal of Cryptology
, vol.17
, Issue.4
, pp. 297-319
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
12
-
-
24144479376
-
Computing the Tate pairing
-
Springer
-
M. Scott, "Computing the Tate pairing," Topics in Cryptology, Springer, pp. 293-304, 2005.
-
(2005)
Topics in Cryptology
, pp. 293-304
-
-
Scott, M.1
-
13
-
-
12344258539
-
Efficient signature generation by smart cards
-
C. P. Schnorr, "Efficient signature generation by smart cards," Journal of Cryptology, vol. 4, no. 3, pp. 161-174, 1991.
-
(1991)
Journal of Cryptology
, vol.4
, Issue.3
, pp. 161-174
-
-
Schnorr, C.P.1
-
14
-
-
67650224819
-
Practical short signature batch verification
-
A. L. Ferrara, M. Green, S. Hohenberger, and M. Ø. Pedersen, "Practical short signature batch verification," Proc. The Cryptographers' Track at the RSA Conference 2009 on Topics in Cryptology, pp. 309-324, 2009.
-
(2009)
Proc. The Cryptographers' Track at the RSA Conference 2009 on Topics in Cryptology
, pp. 309-324
-
-
Ferrara, A.L.1
Green, M.2
Hohenberger, S.3
Pedersen, M.Ø.4
-
16
-
-
70450166722
-
New explicit conditions of elliptic curve traces for FR-Reductions
-
A. Miyaji, M. Nakabayashi, and S. Takano, "New explicit conditions of elliptic curve traces for FR-Reductions." IEIC Technical Report, vol. 100, no. 323, pp. 99-108, 2000.
-
(2000)
IEIC Technical Report
, vol.100
, Issue.323
, pp. 99-108
-
-
Miyaji, A.1
Nakabayashi, M.2
Takano, S.3
-
17
-
-
0003403663
-
-
[Online]. Available
-
"The network simulator - ns-2." [Online]. Available: http://nsnam.isi.edu/nsnam/index.php/UserInformation
-
The Network Simulator - Ns-2
-
-
|