-
1
-
-
36749076982
-
GSIS: A secure and privacy-preserving protocol for vehicular communications
-
X. Lin, X. Sun, P.-H. Ho, and X. Shen, "GSIS: A secure and privacy-preserving protocol for vehicular communications," IEEE Transactions on Vehicular Technology, vol. 56, no. 6, pp. 3442-3456, 2007.
-
(2007)
IEEE Transactions on Vehicular Technology
, vol.56
, Issue.6
, pp. 3442-3456
-
-
Lin, X.1
Sun, X.2
Ho, P.-H.3
Shen, X.4
-
2
-
-
78650423418
-
Roadspeak: Enabling voice chat on roadways using vehicular social networks
-
S. Smaldone, L. Han, P. Shankar, and L. Iftode, "Roadspeak: enabling voice chat on roadways using vehicular social networks," in SocialNets '08, 2008, pp. 43-48.
-
(2008)
SocialNets '08
, pp. 43-48
-
-
Smaldone, S.1
Han, L.2
Shankar, P.3
Iftode, L.4
-
3
-
-
51349156734
-
ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications
-
R. Lu, X. Lin, H. Zhu, P.-H. Ho, and X. Shen, "ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications," in INFOCOM 2008, Phoenix,, April 2008, pp. 1229-1237.
-
INFOCOM 2008, Phoenix,, April 2008
, pp. 1229-1237
-
-
Lu, R.1
Lin, X.2
Zhu, H.3
Ho, P.-H.4
Shen, X.5
-
4
-
-
77953313061
-
Spring: A social-based privacy-preserving packet forwarding protocol for vehicular delay tolerant networks
-
R. Lu, X. Lin, and X. Shen, "Spring: A social-based privacy-preserving packet forwarding protocol for vehicular delay tolerant networks," in INFOCOM 2010, San Diego, California, USA, March 2010, pp. 1-9.
-
INFOCOM 2010, San Diego, California, USA, March 2010
, pp. 1-9
-
-
Lu, R.1
Lin, X.2
Shen, X.3
-
5
-
-
67249135256
-
Cars: Context-aware rate selection for vehicular networks
-
P. Shankar, T. Nadeem, J. Rosca, and L. Iftode, "Cars: Context-aware rate selection for vehicular networks," in ICNP 2008, 2008, pp. 1-12.
-
(2008)
ICNP 2008
, pp. 1-12
-
-
Shankar, P.1
Nadeem, T.2
Rosca, J.3
Iftode, L.4
-
6
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks
-
M. Bellare, D. Pointcheval, and P. Rogaway, "Authenticated key exchange secure against dictionary attacks," in EUROCRYPT, 2000, pp. 139-155.
-
(2000)
EUROCRYPT
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
7
-
-
0242496951
-
Secure multi-party computation problems and their applications: A review and open problems
-
M. Atallah and W. Du, "Secure multi-party computation problems and their applications: a review and open problems," in NSPW, 2001, pp. 13-22.
-
(2001)
NSPW
, pp. 13-22
-
-
Atallah, M.1
Du, W.2
-
8
-
-
38149079700
-
Louis, lester and pierre: Three protocols for location privacy
-
PET 2007, ser.
-
G. Zhong, I. Goldberg, and U. Hengartner, "Louis, lester and pierre: Three protocols for location privacy," in PET 2007, ser. LNCS 4776, 2007, pp. 62-76.
-
(2007)
LNCS
, vol.4776
, pp. 62-76
-
-
Zhong, G.1
Goldberg, I.2
Hengartner, U.3
-
9
-
-
72449202595
-
A new protocol for the nearby friend problem
-
Cryptography and Coding, ser.
-
S. Chatterjee, K. Karabina, and A. Menezes, "A new protocol for the nearby friend problem," in Cryptography and Coding, ser. LNCS 5921, 2009, pp. 236-251.
-
(2009)
LNCS
, vol.5921
, pp. 236-251
-
-
Chatterjee, S.1
Karabina, K.2
Menezes, A.3
|