-
2
-
-
33646820668
-
Efficient and provably-secure identity-based signatures and signcryption from bilinear maps.In
-
Paulo S. L. M. Barreto, Benoît Libert, Noel McCullagh, and Jean-Jacques Quisquater. (2005). Efficient and provably-secure identity-based signatures and signcryption from bilinear maps. In ASIACRYPT, pp. 515-532.
-
(2005)
ASIACRYPT
, pp. 515-532
-
-
Barreto, P.S.L.M.1
Libert, B.2
McCullagh, N.3
Quisquater, J.-J.4
-
4
-
-
37849048533
-
Efficient and robust pseudonymous authentication in vanet
-
ACM New York NY USA
-
Giorgio Calandriello, Panos Papadimitratos, Jean-Pierre Hubaux, andAntonio Lioy. (2007). Efficient and robust pseudonymous authentication in vanet. In VANET '07: Proceedings of the fourth ACM international workshop on Vehicular ad hoc networks. ACM, New York, NY, USA, pp. 19-28.
-
(2007)
In VANET '07: Proceedings of the Fourth ACM International Workshop On Vehicular Ad Hoc Networks
, pp. 19-28
-
-
Calandriello, G.1
Papadimitratos, P.2
Hubaux, J.-P.3
Lioy, A.4
-
5
-
-
85024290278
-
Group signatures.In
-
David Chaum and Eugène van Heyst. (1991). Group signatures. In EUROCRYPT, pp. 257-265.
-
(1991)
EUROCRYPT
, pp. 257-265
-
-
Chaum, D.1
Heyst, E.2
-
6
-
-
32144450457
-
Balancing auditability and privacy in vehicular networks
-
ACM New York NY USA
-
JongYoul Choi, Markus Jakobsson, and Susanne Wetzel. (2005). Balancing auditability and privacy in vehicular networks. In Q2SWinet '05: Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks. ACM, New York, NY, USA, pp. 79-87,
-
(2005)
Q2SWinet '05: Proceedings of the 1st ACM International Workshop On Quality of Service & Security In Wireless and Mobile Networks
, pp. 79-87
-
-
Choi, J.1
Jakobsson, M.2
Wetzel, S.3
-
7
-
-
35048887476
-
Short group signatures.Advances in Cryptology-CRYPTO 2004
-
Springer Berlin/Heidelberg Dec 2004
-
Xavier Boyen Dan Boneh and Hovav Shacham. (Dec. 2004). Short group signatures. Advances in Cryptology - CRYPTO 2004, Lecture Notes in Computer Science, Springer Berlin / Heidelberg, 3152/2004:41-55.
-
(2004)
Lecture Notes In Computer Science
, vol.3152
, pp. 41-55
-
-
Boneh, X.B.D.1
Shacham, H.2
-
8
-
-
33746097415
-
Privacy issues in vehicular ad hoc networks
-
Springer Berlin/Heidelberg
-
Florian Dötzer. (2006). Privacy issues in vehicular ad hoc networks. In Lecture Notes in Computer Science, pages 197-209. Springer, Berlin/Heidelberg.
-
(2006)
Lecture Notes In Computer Science
, pp. 197-209
-
-
Dötzer, F.1
-
13
-
-
36749076982
-
Gsis A secure and privacy-preserving protocol for vehicular communications
-
Xiaodong Lin, Xiaoting Sun, Pin-Han Ho, and Xuemin Shen. Gsis: A secure and privacy-preserving protocol for vehicular communications. Vehicular Technology, IEEE Transactions on, 56(6) (2007), 3442-3456.
-
(2007)
Vehicular Technology, IEEE Transactions On
, vol.56
, Issue.6
, pp. 3442-3456
-
-
Lin, X.1
Sun, X.2
Ho, P.-H.3
Shen, X.4
-
14
-
-
0029717329
-
Proxy signatures for delegating signing operation
-
ACM New York NY USA
-
Masahiro Mambo, Keisuke Usuda, and Eiji Okamoto. (1996). Proxy signatures for delegating signing operation. In CCS '96: Proceedings of the 3rd ACM conference on Computer and communications security, ACM, New York, NY, USA, pp. 48-57.
-
(1996)
In CCS '96: Proceedings of the 3rd ACM Conference On Computer and Communications Security
, pp. 48-57
-
-
Mambo, M.1
Usuda, K.2
Okamoto, E.3
-
17
-
-
0030270929
-
A public-key-based key escrow system
-
James Nechvatal. A public-key-based key escrow system. J. Syst. Softw. 35(1) (1996), 73-83.
-
(1996)
J. Syst. Softw
, vol.35
, Issue.1
, pp. 73-83
-
-
Nechvatal, J.1
-
19
-
-
33845564340
-
Securing vehicular communications
-
October
-
M. Raya, P. Papadimitratos, and J.-P. Hubaux. Securing vehicular communications.Wireless Communications, IEEE 13(5) (October 2006), 8-15.
-
(2006)
Wireless Communications, IEEE
, vol.13
, Issue.5
, pp. 8-15
-
-
Raya, M.1
Papadimitratos, P.2
Hubaux, J.-P.3
-
20
-
-
51349103067
-
Adaptive privacy-preserving authentication in vehicular networks
-
In China 2006.ChinaCom '06 Oct
-
Kewei Sha, Yong Xi, Weisong Shi, L. Schwiebert, and Tao Zhang. (Oct. 2006). Adaptive privacy-preserving authentication in vehicular networks. In Proceedings of the First International Conference on Communications and Networking in China, 2006. ChinaCom '06, pp. 1-8.
-
(2006)
In Proceedings of the First International Conference On Communications and Networking
, pp. 1-8
-
-
Sha, K.1
Xi, Y.2
Shi, W.3
Schwiebert, L.4
Zhang, T.5
-
21
-
-
78651416991
-
Flexible, extensible, and efficient VANET authentication
-
Ahren Studer, Fan Bai, Bhargav Bellur, andAdrian Perrig. Flexible, extensible, and efficient VANET authentication. In Proceedings of the 6th Embedded Security in Cars Conference (ESCAR 08).
-
In Proceedings of the 6th Embedded Security In Cars Conference (ESCAR 08)
-
-
Studer, A.1
Bai, F.2
Bellur, B.3
Perrig, A.4
-
22
-
-
34547533155
-
-
March
-
Yong Xi, Kewei Sha, Weisong Shi, Loren Schwiebert, and Tao Zhang. (March 2007). Enforcing privacy using symmetric random key-set in vehicular networks. pp. 344-351.
-
(2007)
Enforcing Privacy Using Symmetric Random Key-set In Vehicular Networks
, pp. 344-351
-
-
Xi, Y.1
Sha, K.2
Shi, W.3
Schwiebert, L.4
Zhang, T.5
-
23
-
-
84885935292
-
Shorter verifier-local revocation group signatures from bilinear maps
-
Sujing Zhou and Dongdai Lin. (2006). Shorter verifier-local revocation group signatures from bilinear maps. In Cryptology and Network Security.
-
(2006)
In Cryptology and Network Security
-
-
Zhou, S.1
Lin, D.2
-
24
-
-
50249168206
-
Privacy-preserving detection of sybil attacks in vehicular ad hoc networks.In
-
Tong Zhou, Romit Roy Choudhury, Peng Ning, and Krishnendu Chakrabarty. (2007). Privacy-preserving detection of sybil attacks in vehicular ad hoc networks. In MobiQuitous, pp. 1-8.
-
(2007)
MobiQuitous
, pp. 1-8
-
-
Zhou, T.1
Choudhury, R.R.2
Ning, P.3
Chakrabarty, K.4
|