메뉴 건너뛰기




Volumn 2011, Issue , 2011, Pages

Secure and efficient protocol for vehicular ad hoc network with privacy preservation

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATIONAL LOADS; PRIVACY PRESERVATION; SECURE PROTOCOLS; SECURITY REQUIREMENTS; STORAGE MANAGEMENT; VEHICULAR AD HOC NETWORKS;

EID: 79251609501     PISSN: 16871472     EISSN: 16871499     Source Type: Journal    
DOI: 10.1155/2011/716794     Document Type: Article
Times cited : (16)

References (27)
  • 6
    • 36749076982 scopus 로고    scopus 로고
    • GSIS: A secure and privacy-preserving protocol for vehicular communications
    • DOI 10.1109/TVT.2007.906878
    • Lin X., Sun X., Ho P.-H., Shen X., GSIS: a secure and privacy-preserving protocol for vehicular communications IEEE Transactions on Vehicular Technology 2007 56 6 3442 3456 (Pubitemid 350201103)
    • (2007) IEEE Transactions on Vehicular Technology , vol.56 , Issue.6 , pp. 3442-3456
    • Lin, X.1    Sun, X.2    Ho, P.-H.3    Shen, X.4
  • 12
    • 79251627028 scopus 로고    scopus 로고
    • National highway traffic safety administration
    • U.S. Department of Transportation
    • U.S. Department of Transportation, National highway traffic safety administration Vehicle Safety Communications Project, Final Report April 2006
    • (2006) Vehicle Safety Communications Project, Final Report
  • 20
    • 38349174973 scopus 로고    scopus 로고
    • Designing efficient proxy signature schemes for mobile communication
    • Lu R., Dong X., Cao Z., Designing efficient proxy signature schemes for mobile communication Science in China Series F 2008 51 2 183 195
    • (2008) Science in China Series F , vol.51 , Issue.2 , pp. 183-195
    • Lu, R.1    Dong, X.2    Cao, Z.3
  • 22
    • 58149108946 scopus 로고    scopus 로고
    • An efficient mobile authentication scheme for wireless networks
    • Tang C., Wu D. O., An efficient mobile authentication scheme for wireless networks IEEE Transactions on Wireless Communications 2008 7 4 1408 1416
    • (2008) IEEE Transactions on Wireless Communications , vol.7 , Issue.4 , pp. 1408-1416
    • Tang, C.1    Wu, D.O.2
  • 23
    • 78549283709 scopus 로고    scopus 로고
    • Elliptic curve cryptography
    • Kapoor V., Abraham V. S., Singh R., Elliptic curve cryptography Ubiquity 2008 9 20 1 8
    • (2008) Ubiquity , vol.9 , Issue.20 , pp. 1-8
    • Kapoor, V.1    Abraham, V.S.2    Singh, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.