-
1
-
-
79960341369
-
-
http://crypto.stanford.edu/pbc/
-
-
-
-
3
-
-
34548731375
-
Ciphertext-policy attribute-based encryption
-
IEEE Computer Society, Los Alamitos
-
Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, pp. 321-334. IEEE Computer Society, Los Alamitos (2007)
-
(2007)
IEEE Symposium on Security and Privacy
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
4
-
-
78651449231
-
Privacy and anonymity in vanets: A contemporary study
-
Biswas, S., Mahbubul Haque, M., Misic, J.V.: Privacy and anonymity in vanets: A contemporary study. Ad Hoc & Sensor Wireless Networks 10(2-3), 177-192 (2010)
-
(2010)
Ad Hoc & Sensor Wireless Networks
, vol.10
, Issue.2-3
, pp. 177-192
-
-
Biswas, S.1
Mahbubul Haque, M.2
Misic, J.V.3
-
5
-
-
38049078557
-
Multi-authority attribute based encryption
-
Vadhan, S.P. (ed.) TCC 2007. Springer, Heidelberg
-
Chase, M.: Multi-authority attribute based encryption. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 515-534. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4392
, pp. 515-534
-
-
Chase, M.1
-
7
-
-
85024290278
-
Group signatures
-
Davies, D.W. (ed.) EUROCRYPT 1991. Springer, Heidelberg
-
Chaum, D., van Heyst, E.: Group signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 257-265. Springer, Heidelberg (1991)
-
(1991)
LNCS
, vol.547
, pp. 257-265
-
-
Chaum, D.1
Van Heyst, E.2
-
8
-
-
77956961737
-
Secure, selective group broadcast in vehicular networks using dynamic attribute based encryption
-
Chen, N., Gerla, M., Hong, D.H.X.: Secure, selective group broadcast in vehicular networks using dynamic attribute based encryption. In: Ad Hoc Networking Workshop, Med-Hoc-Net, pp. 1-8 (2010)
-
(2010)
Ad Hoc Networking Workshop, Med-Hoc-Net
, pp. 1-8
-
-
Chen, N.1
Gerla, M.2
Hong, D.H.X.3
-
9
-
-
84947273682
-
The Sybil Attack
-
Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. Springer, Heidelberg
-
Douceur, J.R.: The Sybil Attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251-260. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2429
, pp. 251-260
-
-
Douceur, J.R.1
-
10
-
-
73849107877
-
A taxonomy of pairing-friendly elliptic curves
-
Freeman, D., Scott, M., Teske, E.: A taxonomy of pairing-friendly elliptic curves. J. Cryptology 23(2), 224-280 (2010)
-
(2010)
J. Cryptology
, vol.23
, Issue.2
, pp. 224-280
-
-
Freeman, D.1
Scott, M.2
Teske, E.3
-
11
-
-
77953316394
-
On the age of pseudonyms in mobile ad hoc networks
-
IEEE, Los Alamitos
-
Freudiger, J., Manshaei, M.H., Boudec, J.-Y.L., Hubaux, J.-P.: On the age of pseudonyms in mobile ad hoc networks. In: INFOCOM, pp. 1577-1585. IEEE, Los Alamitos (2010)
-
(2010)
INFOCOM
, pp. 1577-1585
-
-
Freudiger, J.1
Manshaei, M.H.2
Boudec, J.-Y.L.3
Hubaux, J.-P.4
-
12
-
-
78649284515
-
Detecting misbehaviors in vanet with integrated root-cause analysis
-
Ghosh, M., Varghese, A., Gupta, A., Kherani, A.A., Muthaiah, S.N.: Detecting misbehaviors in vanet with integrated root-cause analysis. Ad Hoc Networks 8(7), 778-790 (2010)
-
(2010)
Ad Hoc Networks
, vol.8
, Issue.7
, pp. 778-790
-
-
Ghosh, M.1
Varghese, A.2
Gupta, A.3
Kherani, A.A.4
Muthaiah, S.N.5
-
13
-
-
14944372809
-
Detecting and correcting malicious data in vanets
-
Golle, P., Greene, D.H., Staddon, J.: Detecting and correcting malicious data in vanets. In: Vehicular Ad Hoc Networks, pp. 29-37 (2004)
-
(2004)
Vehicular Ad Hoc Networks
, pp. 29-37
-
-
Golle, P.1
Greene, D.H.2
Staddon, J.3
-
14
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: ACM Conference on Computer and Communications Security, pp. 89-98 (2006)
-
(2006)
ACM Conference on Computer and Communications Security
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
15
-
-
78149431890
-
Situation-aware trust architecture for vehicular networks
-
Huang, D., Hong, X., Gerla, M.: Situation-aware trust architecture for vehicular networks. Topics In Automotive Networking 48(11), 128-135 (2010)
-
(2010)
Topics in Automotive Networking
, vol.48
, Issue.11
, pp. 128-135
-
-
Huang, D.1
Hong, X.2
Gerla, M.3
-
16
-
-
67650409731
-
ASPE: Attribute-based secure policy enforcement in vehicular ad hoc networks
-
Huang, D., Verma, M.: ASPE: attribute-based secure policy enforcement in vehicular ad hoc networks. Ad Hoc Networks 7(8), 1526-1535 (2009)
-
(2009)
Ad Hoc Networks
, vol.7
, Issue.8
, pp. 1526-1535
-
-
Huang, D.1
Verma, M.2
-
17
-
-
57449086537
-
Secure vehicular communication systems: Implementation, performance, and research challenges
-
Kargl, F., Papadimitratos, P., Buttyan, L., Mter, M., Schoch, E., Wiedersheim, B., Thong, T.v., Cal, G., Held, A., Kung, A., Hubaux, J.p.: Secure vehicular communication systems: Implementation, performance, and research challenges. IEEE Wireless Communication Magazine, 110-118 (2008)
-
(2008)
IEEE Wireless Communication Magazine
, pp. 110-118
-
-
Kargl, F.1
Papadimitratos, P.2
Buttyan, L.3
Mter, M.4
Schoch, E.5
Wiedersheim, B.6
Thong, T.V.7
Cal, G.8
Held, A.9
Kung, A.10
Hubaux, J.P.11
-
18
-
-
79957993008
-
Decentralizing Attribute-Based Encryption
-
Paterson, K.G. (ed.) EUROCRYPT 2011. Springer, Heidelberg eprint.iacr.org/2010/351.pdf (last accessed February 22, 2011)
-
Lewko, A., Waters, B.: Decentralizing Attribute-Based Encryption. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 568-588. Springer, Heidelberg (2011), eprint.iacr.org/2010/351.pdf (last accessed February 22, 2011)
-
(2011)
LNCS
, vol.6632
, pp. 568-588
-
-
Lewko, A.1
Waters, B.2
-
19
-
-
57449105235
-
Secure vehicular communication systems: Design and architecture
-
Papadimitratos, P., Buttyan, L., Holczer, T., Schoch, E., Freudiger, J., Raya, M., Ma, Z., Kargl, F., Kung, A., Hubaux, J.p.: Secure vehicular communication systems: design and architecture. IEEE Wireless Communication Magazine, 100-109 (2008)
-
(2008)
IEEE Wireless Communication Magazine
, pp. 100-109
-
-
Papadimitratos, P.1
Buttyan, L.2
Holczer, T.3
Schoch, E.4
Freudiger, J.5
Raya, M.6
Ma, Z.7
Kargl, F.8
Kung, A.9
Hubaux, J.P.10
-
20
-
-
77951463026
-
Defense against sybil attack in vehicular ad hoc network based on roadside unit support
-
Park, S., Aslam, B., Turgut, D., Zou, C.C.: Defense against sybil attack in vehicular ad hoc network based on roadside unit support. In: MILCOM, pp. 1-7 (2009)
-
(2009)
MILCOM
, pp. 1-7
-
-
Park, S.1
Aslam, B.2
Turgut, D.3
Zou, C.C.4
-
21
-
-
33845753044
-
Challenges in security vehicular networks
-
Parno, B., Perrig, A.: Challenges in security vehicular networks. In: HotNets-IV (2005)
-
(2005)
HotNets-IV
-
-
Parno, B.1
Perrig, A.2
-
23
-
-
51349155690
-
On data-centric trust establishment in ephemeral ad hoc networks
-
IEEE, Los Alamitos
-
Raya, M., Papadimitratos, P., Gligor, V.D., Hubaux, J.-P.: On data-centric trust establishment in ephemeral ad hoc networks. In: INFOCOM, pp. 1238-1246. IEEE, Los Alamitos (2008)
-
(2008)
INFOCOM
, pp. 1238-1246
-
-
Raya, M.1
Papadimitratos, P.2
Gligor, V.D.3
Hubaux, J.-P.4
-
24
-
-
77952348271
-
On the tradeoff between trust and privacy in wireless ad hoc networks
-
Wetzel, S., Nita-Rotaru, C., Stajano, F. (eds.) ACM, New York
-
Raya, M., Shokri, R., Hubaux, J.-P.: On the tradeoff between trust and privacy in wireless ad hoc networks. In: Wetzel, S., Nita-Rotaru, C., Stajano, F. (eds.) WISEC, pp. 75-80. ACM, New York (2010)
-
(2010)
WISEC
, pp. 75-80
-
-
Raya, M.1
Shokri, R.2
Hubaux, J.-P.3
-
26
-
-
24944554962
-
Fuzzy Identity-Based Encryption
-
Cramer, R. (ed.) EUROCRYPT 2005. Springer, Heidelberg
-
Sahai, A., Waters, B.: Fuzzy Identity-Based Encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457-473. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
27
-
-
57049149967
-
Caravan: Providing location privacy for vanet
-
Sampigethaya, K., Huang, L., Li, M., Poovendran, R., Matsuura, K., Sezaki, K.: Caravan: Providing location privacy for vanet. In: Proc. of the Workshop on Embedded Security in Cars, ESCAR (2005)
-
Proc. of the Workshop on Embedded Security in Cars, ESCAR (2005)
-
-
Sampigethaya, K.1
Huang, L.2
Li, M.3
Poovendran, R.4
Matsuura, K.5
Sezaki, K.6
-
28
-
-
35349016950
-
Amoeba: Robust location privacy scheme for vanet
-
Sampigethaya, K., Li, M., Huang, L., Poovendran, R.: Amoeba: Robust location privacy scheme for vanet. IEEE Journal on Selected Areas in Communications 25(8), 1569-1589 (2007)
-
(2007)
IEEE Journal on Selected Areas in Communications
, vol.25
, Issue.8
, pp. 1569-1589
-
-
Sampigethaya, K.1
Li, M.2
Huang, L.3
Poovendran, R.4
-
29
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. Springer, Heidelberg
-
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47-53. Springer, Heidelberg (1985)
-
(1985)
LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
31
-
-
77956735087
-
An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications
-
Sun, Y., Lu, R., Lin, X., Shen, X., Su, J.: An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications. IEEE Trans. on Vehicular Technology 59(7), 3589-3603 (2010)
-
(2010)
IEEE Trans. on Vehicular Technology
, vol.59
, Issue.7
, pp. 3589-3603
-
-
Sun, Y.1
Lu, R.2
Lin, X.3
Shen, X.4
Su, J.5
-
32
-
-
67249107220
-
Ecmv: Efficient certificate management scheme for vehicular networks
-
IEEE, Los Alamitos
-
Wasef, A., Jiang, Y., Shen, X.: Ecmv: Efficient certificate management scheme for vehicular networks. In: GLOBECOM, pp. 639-643. IEEE, Los Alamitos (2008)
-
(2008)
GLOBECOM
, pp. 639-643
-
-
Wasef, A.1
Jiang, Y.2
Shen, X.3
-
34
-
-
79952071204
-
FDAC: Toward fine-grained distributed data access control in wireless sensor networks
-
Yu, S., Ren, K., Lou, W.: FDAC: Toward fine-grained distributed data access control in wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems 22(4), 673-686 (2011)
-
(2011)
IEEE Transactions on Parallel and Distributed Systems
, vol.22
, Issue.4
, pp. 673-686
-
-
Yu, S.1
Ren, K.2
Lou, W.3
-
35
-
-
50249168206
-
Privacy-preserving detection of sybil attacks in vehicular ad hoc networks
-
IEEE, Los Alamitos
-
Zhou, T., Choudhury, R.R., Ning, P., Chakrabarty, K.: Privacy-preserving detection of sybil attacks in vehicular ad hoc networks. In: MobiQuitous, pp. 1-8. IEEE, Los Alamitos (2007)
-
(2007)
MobiQuitous
, pp. 1-8
-
-
Zhou, T.1
Choudhury, R.R.2
Ning, P.3
Chakrabarty, K.4
|