메뉴 건너뛰기




Volumn , Issue , 2010, Pages

PPC: Privacy-preserving chatting in vehicular peer-to-peer networks

Author keywords

Chatting; Identity based encryption; Ring signature; Security and privacy; Vehicular peer to peer network

Indexed keywords

CHATTING; DATA CONFIDENTIALITY; EFFICIENCY ANALYSIS; EFFICIENT AUTHENTICATION; ENCRYPTION TECHNIQUE; IDENTITY BASED ENCRYPTION; IDENTITY-BASED; MESSAGE AUTHENTICATION; PRIVACY PRESERVING; PRIVACY VIOLATION; RING SIGNATURES; SECURITY AND PRIVACY; USER PRIVACY; VEHICULAR COMMUNICATIONS;

EID: 78649430054     PISSN: 15502252     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/VETECF.2010.5594423     Document Type: Conference Paper
Times cited : (5)

References (11)
  • 2
    • 36749076982 scopus 로고    scopus 로고
    • Gsis: A secure and privacy-preserving protocol for vehicular communications
    • X. Lin, X. Sun, P.-H. Ho, and X. Shen, "Gsis: A secure and privacy-preserving protocol for vehicular communications," IEEE Transactions on Vehicular Technology, vol. 56, no. 6, pp. 3442-3456, 2007.
    • (2007) IEEE Transactions on Vehicular Technology , vol.56 , Issue.6 , pp. 3442-3456
    • Lin, X.1    Sun, X.2    Ho, P.-H.3    Shen, X.4
  • 3
    • 51349156734 scopus 로고    scopus 로고
    • Ecpp: Efficient conditional privacy preservation protocol for secure vehicular communications
    • R. Lu, X. Lin, H. Zhu, P.-H. Ho, and X. Shen, "Ecpp: Efficient conditional privacy preservation protocol for secure vehicular communications," in INFOCOM, 2008, pp. 1229-1237.
    • (2008) INFOCOM , pp. 1229-1237
    • Lu, R.1    Lin, X.2    Zhu, H.3    Ho, P.-H.4    Shen, X.5
  • 4
    • 35048887476 scopus 로고    scopus 로고
    • Short group signatures
    • D. Boneh, X. Boyen, and H. Shacham, "Short group signatures," in CRYPTO, 2004, pp. 41-55.
    • (2004) CRYPTO , pp. 41-55
    • Boneh, D.1    Boyen, X.2    Shacham, H.3
  • 5
    • 38149076425 scopus 로고    scopus 로고
    • Short group signature without random oracles
    • X. Liang, Z. Cao, J. Shao, and H. Lin, "Short group signature without random oracles," in ICICS, 2007, pp. 69-82.
    • (2007) ICICS , pp. 69-82
    • Liang, X.1    Cao, Z.2    Shao, J.3    Lin, H.4
  • 6
    • 77954472312 scopus 로고    scopus 로고
    • Secure provenance: The essential of bread and butter of data forensics in cloud computing
    • R. Lu, X. Lin, X. Liang, and X. Shen, "Secure provenance: The essential of bread and butter of data forensics in cloud computing," in ASIACCS, 2010.
    • (2010) ASIACCS
    • Lu, R.1    Lin, X.2    Liang, X.3    Shen, X.4
  • 7
    • 36049024799 scopus 로고    scopus 로고
    • Efficient ring signatures without random oracles
    • H. Shacham and B. Waters, "Efficient ring signatures without random oracles," in Public Key Cryptography, 2007, pp. 166-180.
    • (2007) Public Key Cryptography , pp. 166-180
    • Shacham, H.1    Waters, B.2
  • 8
    • 33845272549 scopus 로고    scopus 로고
    • Id-based ring signature scheme secure in the standard model
    • M. H. Au, J. K. Liu, T. H. Yuen, and D. S. Wong, "Id-based ring signature scheme secure in the standard model," in IWSEC, 2006, pp. 1-16.
    • (2006) IWSEC , pp. 1-16
    • Au, M.H.1    Liu, J.K.2    Yuen, T.H.3    Wong, D.S.4
  • 11
    • 24944566040 scopus 로고    scopus 로고
    • Efficient identity-based encryption without random oracles
    • B. Waters, "Efficient identity-based encryption without random oracles," in EUROCRYPT, 2005, pp. 114-127.
    • (2005) EUROCRYPT , pp. 114-127
    • Waters, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.