-
3
-
-
84948137719
-
Extended proxy signatures for smart cards
-
Okamoto T., Tada M., Okamoto E., Extended proxy signatures for smart cards 1729 Proceedings of the 2nd InternationalWorkshop on Information Security November 1999 Kuala Lumpur, Malaysia 773 773 Lecture Notes in Computer Science
-
Proceedings of the 2nd InternationalWorkshop on Information Security November 1999 Kuala Lumpur, Malaysia Lecture Notes in Computer Science
, vol.1729
, pp. 773-773
-
-
Okamoto, T.1
Tada, M.2
Okamoto, E.3
-
4
-
-
35048887476
-
Short group signatures
-
Santa Barbara, Calif, USA Lecture Notes in Computer Science
-
Boneh D., Boyen X., Shacham H., Short group signatures 3152 Proceedings of the 24th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO '04) 2004 Santa Barbara, Calif, USA 41 55 Lecture Notes in Computer Science
-
(2004)
Proceedings of the 24th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO '04)
, vol.3152
, pp. 41-55
-
-
Boneh, D.1
Boyen, X.2
Shacham, H.3
-
6
-
-
36749076982
-
GSIS: A secure and privacy-preserving protocol for vehicular communications
-
DOI 10.1109/TVT.2007.906878
-
Lin X., Sun X., Ho P.-H., Shen X., GSIS: a secure and privacy-preserving protocol for vehicular communications IEEE Transactions on Vehicular Technology 2007 56 6 3442 3456 (Pubitemid 350201103)
-
(2007)
IEEE Transactions on Vehicular Technology
, vol.56
, Issue.6
, pp. 3442-3456
-
-
Lin, X.1
Sun, X.2
Ho, P.-H.3
Shen, X.4
-
9
-
-
51349103067
-
Adaptive privacy-preserving authentication in vehicular networks
-
October 2006
-
Sha K., Xi Y., Shi W., Schwiebert L., Zhang T., Adaptive privacy-preserving authentication in vehicular networks Proceedings of the International Workshop on Vehicle Communication and Applications October 2006 1 8
-
Proceedings of the International Workshop on Vehicle Communication and Applications
, pp. 1-8
-
-
Sha, K.1
Xi, Y.2
Shi, W.3
Schwiebert, L.4
Zhang, T.5
-
10
-
-
35349016950
-
AMOEBA: Robust location privacy scheme for VANET
-
Sampigethaya K., Li M., Huang L., Poovendran R., AMOEBA: robust location privacy scheme for VANET IEEE Journal on Selected Areas in Communications 2007 25 8 1569 1589
-
(2007)
IEEE Journal on Selected Areas in Communications
, vol.25
, Issue.8
, pp. 1569-1589
-
-
Sampigethaya, K.1
Li, M.2
Huang, L.3
Poovendran, R.4
-
12
-
-
79251627028
-
National highway traffic safety administration
-
U.S. Department of Transportation
-
U.S. Department of Transportation, National highway traffic safety administration Vehicle Safety Communications Project, Final Report April 2006
-
(2006)
Vehicle Safety Communications Project, Final Report
-
-
-
13
-
-
51449098979
-
An efficient identity-based batch verification scheme for vehicular sensor networks
-
April 2008
-
Zhang C., Lu R., Lin X., Ho P.-H., Shen X., An efficient identity-based batch verification scheme for vehicular sensor networks Proceedings of the 27th IEEE Communications Society Conference on Computer Communications (INFOCOM '08) April 2008 816 824
-
Proceedings of the 27th IEEE Communications Society Conference on Computer Communications (INFOCOM '08)
, pp. 816-824
-
-
Zhang, C.1
Lu, R.2
Lin, X.3
Ho, P.-H.4
Shen, X.5
-
15
-
-
51349156734
-
ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications
-
April 2008
-
Lu R., Lin X., Zhu H., Ho P.-H., Shen X., ECPP: efficient conditional privacy preservation protocol for secure vehicular communications Proceedings of the 27th IEEE Communications Society Conference on Computer Communications (INFOCOM '08) April 2008 1903 1911
-
Proceedings of the 27th IEEE Communications Society Conference on Computer Communications (INFOCOM '08)
, pp. 1903-1911
-
-
Lu, R.1
Lin, X.2
Zhu, H.3
Ho, P.-H.4
Shen, X.5
-
18
-
-
0032218229
-
A security architecture for computational grids
-
November 1998 San Francisco, Calif, USA
-
Foster I., Kesselman C., Tsudik G., Tuecke S., A security architecture for computational grids Proceedings of the 5th ACM Conference on Computer and Communications Security (CCS '98) November 1998 San Francisco, Calif, USA 83 92
-
Proceedings of the 5th ACM Conference on Computer and Communications Security (CCS '98)
, pp. 83-92
-
-
Foster, I.1
Kesselman, C.2
Tsudik, G.3
Tuecke, S.4
-
19
-
-
84948137719
-
Extended proxy signatures for smart cards
-
November, Kuala Lumpur, Malaysia Lecture Notes in Computer Science
-
Okamoto T., Tada M., Okamoto E., Extended proxy signatures for smart cards 1729 Proceedings of the 2nd InternationalWorkshop on Information Security November 1999 Kuala Lumpur, Malaysia 247 258 Lecture Notes in Computer Science
-
(1999)
Proceedings of the 2nd InternationalWorkshop on Information Security
, vol.1729
, pp. 247-258
-
-
Okamoto, T.1
Tada, M.2
Okamoto, E.3
-
20
-
-
38349174973
-
Designing efficient proxy signature schemes for mobile communication
-
Lu R., Dong X., Cao Z., Designing efficient proxy signature schemes for mobile communication Science in China Series F 2008 51 2 183 195
-
(2008)
Science in China Series F
, vol.51
, Issue.2
, pp. 183-195
-
-
Lu, R.1
Dong, X.2
Cao, Z.3
-
21
-
-
0010567510
-
Proxy signature, revisited
-
Kim S., Park S., Won D., Proxy signature, revisited 1334 Proceedings of the Information and Communications Security 1997 223 232 Lecture Notes in Computer Science
-
Proceedings of the Information and Communications Security 1997 Lecture Notes in Computer Science
, vol.1334
, pp. 223-232
-
-
Kim, S.1
Park, S.2
Won, D.3
-
22
-
-
58149108946
-
An efficient mobile authentication scheme for wireless networks
-
Tang C., Wu D. O., An efficient mobile authentication scheme for wireless networks IEEE Transactions on Wireless Communications 2008 7 4 1408 1416
-
(2008)
IEEE Transactions on Wireless Communications
, vol.7
, Issue.4
, pp. 1408-1416
-
-
Tang, C.1
Wu, D.O.2
-
25
-
-
84946840347
-
Short signatures from the weil pairing
-
December 2001 Gold Coast, Australia
-
Boneh D., Lynn B., Shacham H., Short signatures from the weil pairing 2248 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security (Asiacrypt '01) December 2001 Gold Coast, Australia 514 532
-
Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security (Asiacrypt '01)
, vol.2248
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
26
-
-
35248835575
-
Aggregate and verifiably encrypted signatures from bilinear maps
-
May 2003 Warsaw, Poland Lecture Notes in Computer Science
-
Boneh D., Gentry C., Lynn B., Shacham H., Aggregate and verifiably encrypted signatures from bilinear maps 2656 Proceedings of the 22nd Annual International Conference on the Theory and Applications of Cryptographic Techniques (Eurocrypt '03) May 2003 Warsaw, Poland 416 432 Lecture Notes in Computer Science
-
Proceedings of the 22nd Annual International Conference on the Theory and Applications of Cryptographic Techniques (Eurocrypt '03)
, vol.2656
, pp. 416-432
-
-
Boneh, D.1
Gentry, C.2
Lynn, B.3
Shacham, H.4
|