-
1
-
-
33745948310
-
The security of vehicular ad hoc networks
-
DOI 10.1145/1102219.1102223, SASN'05 - Proceedings of the 2005 ACM Workshop on Security of Ad Hoc and Sensor Networks
-
M. Raya and J. Hubaux, "The security of vehicular ad hoc networks," in Proc. 3rd ACM Workshop Security Ad Hoc Sensor Networks, Alexandria, VA, 2005, pp. 11-21. (Pubitemid 44059925)
-
(2005)
SASN'05 - Proceedings of the 2005 ACM Workshop on Security of Ad Hoc and Sensor Networks
, vol.2005
, pp. 11-21
-
-
Raya, M.1
Hubaux, J.-P.2
-
2
-
-
51349156734
-
ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications
-
Phoenix, AZ
-
R. Lu, X. Lin, H. Zhu, P. Ho, and X. Shen, "ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications," in Proc. IEEE INFOCOM, Phoenix, AZ, 2008, pp. 1229-1237.
-
(2008)
Proc. IEEE INFOCOM
, pp. 1229-1237
-
-
Lu, R.1
Lin, X.2
Zhu, H.3
Ho, P.4
Shen, X.5
-
3
-
-
13244255377
-
A vehicle-to-vehicle communication protocol for cooperative collision warning
-
Proceedings of MOBIQUITOUS 2004 - 1st Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services
-
X. Yang, J. Liu, F. Zhao, and N. Vaidya, "A vehicle-to-vehicle communication protocol for cooperative collision warning," in Proc. 1st Annu. Int. Conf. MobiQuitous, Boston, MA, 2004, pp. 114-123. (Pubitemid 40184586)
-
(2004)
Proceedings of MOBIQUITOUS 2004 - 1st Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services
, pp. 114-123
-
-
Yang, X.1
Liu, J.2
Zhao, F.3
Vaidya, N.H.4
-
4
-
-
36749076982
-
GSIS: A secure and privacy-preserving protocol for vehicular communications
-
6 I, DOI 10.1109/TVT.2007.906878
-
X. Lin, X. Sun, P. Ho, and X. Shen, "GSIS: A secure and privacypreserving protocol for vehicular communications," IEEE Trans. Veh. Technol., vol. 56, no. 6, pp. 3442-3456, Nov. 2007. (Pubitemid 350201103)
-
(2007)
IEEE Transactions on Vehicular Technology
, vol.56
, pp. 3442-3456
-
-
Lin, X.1
Sun, X.2
Ho, P.-H.3
Shen, X.4
-
5
-
-
70350330400
-
Security in service-oriented vehicular networks
-
Aug.
-
H. Zhu, R. Lu, X. Shen, and X. Lin, "Security in service-oriented vehicular networks," IEEE Wireless Commun., vol. 16, no. 4, pp. 16-22, Aug. 2009.
-
(2009)
IEEE Wireless Commun.
, vol.16
, Issue.4
, pp. 16-22
-
-
Zhu, H.1
Lu, R.2
Shen, X.3
Lin, X.4
-
6
-
-
39449084181
-
Routing in vehicular ad hoc networks: A survey
-
DOI 10.1109/MVT.2007.912927
-
F. Li and Y. Wang, "Routing in vehicular ad hoc networks: A survey," IEEE Veh. Technol. Mag., vol. 2, no. 2, pp. 12-22, Jun. 2007. (Pubitemid 351267703)
-
(2007)
IEEE Vehicular Technology Magazine
, vol.2
, Issue.2
, pp. 12-22
-
-
Li, F.1
Wang, Y.2
-
7
-
-
69549116414
-
VANET routing on city roads using real-time vehicular traffic information
-
Sep.
-
J. Nzouonta, N. Rajgure, G. Wang, and C. Borcea, "VANET routing on city roads using real-time vehicular traffic information," IEEE Trans. Veh. Technol., vol. 58, no. 7, pp. 3609-3626, Sep. 2009.
-
(2009)
IEEE Trans. Veh. Technol.
, vol.58
, Issue.7
, pp. 3609-3626
-
-
Nzouonta, J.1
Rajgure, N.2
Wang, G.3
Borcea, C.4
-
8
-
-
55149100626
-
SLAB: A secure localized authentication and billing scheme for wireless mesh networks
-
Oct.
-
H. Zhu, X. Lin, R. Lu, P. Ho, and X. Shen, "SLAB: A secure localized authentication and billing scheme for wireless mesh networks," IEEE Trans. Wireless Commun., vol. 7, no. 10, pp. 3858-3868, Oct. 2008.
-
(2008)
IEEE Trans. Wireless Commun.
, vol.7
, Issue.10
, pp. 3858-3868
-
-
Zhu, H.1
Lin, X.2
Lu, R.3
Ho, P.4
Shen, X.5
-
9
-
-
66449108023
-
PPAB: A privacy-preserving authentication and billing architecture for metropolitan area sharing networks
-
Jun.
-
H. Zhu, X. Lin, M. Shi, P. Ho, and X. Shen, "PPAB: A privacy-preserving authentication and billing architecture for metropolitan area sharing networks," IEEE Trans. Veh. Technol., vol. 58, no. 5, pp. 2529-2543, Jun. 2009.
-
(2009)
IEEE Trans. Veh. Technol.
, vol.58
, Issue.5
, pp. 2529-2543
-
-
Zhu, H.1
Lin, X.2
Shi, M.3
Ho, P.4
Shen, X.5
-
10
-
-
70350238158
-
SMART: A secure multilayer credit-based incentive scheme for delay-tolerant networks
-
Oct.
-
H. Zhu, X. Lin, R. Lu, Y. Fan, and X. Shen, "SMART: A secure multilayer credit-based incentive scheme for delay-tolerant networks," IEEE Trans. Veh. Technol., vol. 58, no. 8, pp. 4628-4639, Oct. 2009.
-
(2009)
IEEE Trans. Veh. Technol.
, vol.58
, Issue.8
, pp. 4628-4639
-
-
Zhu, H.1
Lin, X.2
Lu, R.3
Fan, Y.4
Shen, X.5
-
11
-
-
74049097109
-
On noncooperative location privacy: A game-theoretic analysis
-
Chicago, IL
-
J. Freudiger, M. Manshaei, J. Hubaux, and D. Parkes, "On noncooperative location privacy: A game-theoretic analysis," in Proc. 16th ACM Conf. CCS, Chicago, IL, 2009, pp. 324-337.
-
(2009)
Proc. 16th ACM Conf. CCS
, pp. 324-337
-
-
Freudiger, J.1
Manshaei, M.2
Hubaux, J.3
Parkes, D.4
-
12
-
-
0005063385
-
Onion routing
-
Feb.
-
D. Goldschlag, M. Reed, and P. Syverson, "Onion routing," Commun. ACM, vol. 42, no. 2, pp. 39-41, Feb. 1999.
-
(1999)
Commun. ACM
, vol.42
, Issue.2
, pp. 39-41
-
-
Goldschlag, D.1
Reed, M.2
Syverson, P.3
-
13
-
-
74049117962
-
Certificateless onion routing
-
Chicago, IL
-
D. Catalano, D. Fiore, and R. Gennaro, "Certificateless onion routing," in Proc. 16th ACM Conf. CCS, Chicago, IL, 2009, pp. 151-160.
-
(2009)
Proc. 16th ACM Conf. CCS
, pp. 151-160
-
-
Catalano, D.1
Fiore, D.2
Gennaro, R.3
-
14
-
-
35248866223
-
Certificate-based encryption and the certificate revocation problem
-
Warsaw, Poland
-
C. Gentry, "Certificate-based encryption and the certificate revocation problem," in Proc. Int. Conf. Theory Appl. Cryptographic Techn., Warsaw, Poland, 2003, pp. 272-293.
-
(2003)
Proc. Int. Conf. Theory Appl. Cryptographic Techn.
, pp. 272-293
-
-
Gentry, C.1
-
15
-
-
59249093973
-
Certificate revocation list distribution in vehicular communication systems
-
San Francisco, CA
-
P. Papadimitratos, G. Mezzour, and J. Hubaux, "Certificate revocation list distribution in vehicular communication systems," in Proc. 5th ACM Int. Workshop VANET, San Francisco, CA, 2008, pp. 86-87.
-
(2008)
Proc. 5th ACM Int. Workshop VANET
, pp. 86-87
-
-
Papadimitratos, P.1
Mezzour, G.2
Hubaux, J.3
-
17
-
-
33645584388
-
Generic construction of certificateless encryption
-
Assisi, Italy
-
D. Yum and P. Lee, "Generic construction of certificateless encryption," in Proc. ICCSA, Assisi, Italy, 2004, pp. 802-811.
-
(2004)
Proc. ICCSA
, pp. 802-811
-
-
Yum, D.1
Lee, P.2
-
18
-
-
24144438230
-
CBE from CL-PKE: A generic construction and efficient schemes
-
Public Key Cryptography - PKC 2005 - 8th International Workshop on Theory and Practice in Public Key Cryptography
-
S. Al-Riyami and K. Paterson, "CBE from CL-PKE: A generic construction and efficient schemes," in Proc. 8th Int. Workshop Theory Practice PKC, Les Diablerets, Switzerland, 2005, pp. 398-415. (Pubitemid 41231345)
-
(2005)
Lecture Notes in Computer Science
, vol.3386
, pp. 398-415
-
-
Al-Riyami, S.S.1
Paterson, K.G.2
-
19
-
-
33845726678
-
Securing vehicular ad hoc networks
-
M. Raya and J. Hubaux, "Securing vehicular ad hoc networks," J. Comput. Security, vol. 15, no. 1, pp. 39-68, 2007. (Pubitemid 46012642)
-
(2007)
Journal of Computer Security
, vol.15
, Issue.1
, pp. 39-68
-
-
Raya, M.1
Hubaux, J.-P.2
-
20
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Santa Barbara, CA
-
A. Shamir, "Identity-based cryptosystems and signature schemes," in Proc. 4th Int. Cryptology Conf., Santa Barbara, CA, 1984, pp. 47-53.
-
(1984)
Proc. 4th Int. Cryptology Conf.
, pp. 47-53
-
-
Shamir, A.1
-
21
-
-
33745833916
-
On constructing certificateless cryptosystems from identity based encryption
-
3958 LNCS, DOI 10.1007/11745853-31, Public Key Cryptography - PKC 2006 - 9th International Conference on Theory and Practice in Public-Key Cryptography, Proceedings
-
B. Libert and J. Quisquater, "On constructing certificateless cryptosystems from identity based encryption," in Proc. 9th Int. Workshop Theory Practice PKC, New York, 2006, pp. 474-490. (Pubitemid 44029600)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, pp. 474-490
-
-
Libert, B.1
Quisquater, J.-J.2
-
22
-
-
84876300178
-
Malicious KGC attacks in certificateless cryptography
-
Singapore
-
M. Au, Y. Mu, J. Chen, D. Wong, J. Liu, and G. Yang, "Malicious KGC attacks in certificateless cryptography," in Proc. 2nd ASIACCS, Singapore, 2007, pp. 302-311.
-
(2007)
Proc. 2nd ASIACCS
, pp. 302-311
-
-
Au, M.1
Mu, Y.2
Chen, J.3
Wong, D.4
Liu, J.5
Yang, G.6
-
23
-
-
33846219987
-
Certificateless signature: A new security model and an improved generic construction
-
DOI 10.1007/s10623-006-9022-9
-
B. Hu, D. Wong, Z. Zhang, and X. Deng, "Certificateless signature: A new security model and an improved generic construction," Des., Codes Cryptography, vol. 42, no. 2, pp. 109-126, Feb. 2007. (Pubitemid 46094766)
-
(2007)
Designs, Codes, and Cryptography
, vol.42
, Issue.2
, pp. 109-126
-
-
Hu, B.C.1
Wong, D.S.2
Zhang, Z.3
Deng, X.4
-
24
-
-
33845956283
-
Simulatability and security of certificateless threshold signatures
-
DOI 10.1016/j.ins.2006.08.008, PII S002002550600243X
-
L. Wang, Z. Cao, X. Li, and H. Qian, "Simulatability and security of certificateless threshold signatures," Inf. Sci., vol. 177, no. 6, pp. 1382-1394, Mar. 2007. (Pubitemid 46037667)
-
(2007)
Information Sciences
, vol.177
, Issue.6
, pp. 1382-1394
-
-
Wang, L.1
Cao, Z.2
Li, X.3
Qian, H.4
-
25
-
-
62449111027
-
Certificateless signcryption
-
Tokyo, Japan
-
M. Barbosa and P. Farshim, "Certificateless signcryption," in Proc. 4th ASIACCS, Tokyo, Japan, 2008, pp. 369-372.
-
(2008)
Proc. 4th ASIACCS
, pp. 369-372
-
-
Barbosa, M.1
Farshim, P.2
-
27
-
-
0021409284
-
Probabilistic encryption
-
Apr.
-
S. Goldwasser and S. Micali, "Probabilistic encryption," J. Comput. Syst. Sci., vol. 28, no. 2, pp. 270-299, Apr. 1984.
-
(1984)
J. Comput. Syst. Sci.
, vol.28
, Issue.2
, pp. 270-299
-
-
Goldwasser, S.1
Micali, S.2
-
29
-
-
0037623983
-
Identity-based encryption from the Weil pairing
-
D. Boneh and M. Franklin, "Identity-based encryption from the Weil pairing," SIAM J. Comput., vol. 32, no. 3, pp. 586-615, 2003.
-
(2003)
SIAM J. Comput.
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
30
-
-
79951867740
-
State of the art in hardware implementations of cryptographic algorithms
-
Mar.
-
"State of the art in hardware implementations of cryptographic algorithms," ECRYPT Techn. Rep., Mar. 2006.
-
(2006)
ECRYPT Techn. Rep.
-
-
-
31
-
-
0001057132
-
Optimal normal bases
-
Dec.
-
S. Gao and H. Lenstra, "Optimal normal bases," Des., Codes Cryptography, vol. 2, no. 4, pp. 315-323, Dec. 1992.
-
(1992)
Des., Codes Cryptography
, vol.2
, Issue.4
, pp. 315-323
-
-
Gao, S.1
Lenstra, H.2
-
32
-
-
47049121755
-
Bit-parallel polynomial basis multiplier for new classes of finite fields
-
Aug.
-
H. Wu, "Bit-parallel polynomial basis multiplier for new classes of finite fields," IEEE Trans. Comput., vol. 57, no. 8, pp. 1023-1031, Aug. 2008.
-
(2008)
IEEE Trans. Comput.
, vol.57
, Issue.8
, pp. 1023-1031
-
-
Wu, H.1
-
34
-
-
85020399101
-
-
D. R. L. Brown SEC 2: Sep.
-
D. R. L. Brown, SEC 2: Recommended Elliptic Curve Domain Parameters, Sep. 2005. [Online]. Available: www.secg.org/download/aid-776/sec2.pdf
-
(2005)
Recommended Elliptic Curve Domain Parameters
-
-
-
35
-
-
0027726717
-
Random oracles are practical: A paradigm for designing efficient protocols
-
Fairfax, VA
-
M. Bellare and P. Rogaway, "Random oracles are practical: A paradigm for designing efficient protocols," in Proc. 1st ACM Conf. CCS, Fairfax, VA, 1993, pp. 62-73.
-
(1993)
Proc. 1st ACM Conf. CCS
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
36
-
-
1642489925
-
OAEP reconsidered
-
V. Shoup, "OAEP reconsidered," J. Cryptology, vol. 15, no. 4, pp. 223-249, 2008.
-
(2008)
J. Cryptology
, vol.15
, Issue.4
, pp. 223-249
-
-
Shoup, V.1
-
37
-
-
0017930809
-
Method for obtaining digital signatures and public-key cryptosystems
-
DOI 10.1145/359340.359342
-
R. L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Commun. ACM, vol. 21, no. 2, pp. 120-126, 1978. (Pubitemid 8591219)
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
|