-
2
-
-
0003735739
-
-
Certicom Research, Canada; and Dept. of Combinatorics and Optimization, University of Waterloo, Canada, Tech. Rep.
-
D. Johnson and A. Menezes, "The elliptic curve digital signature algorithm (ecdsa)," Certicom Research, Canada; and Dept. of Combinatorics and Optimization, University of Waterloo, Canada, Tech. Rep., 1999.
-
(1999)
The Elliptic Curve Digital Signature Algorithm (Ecdsa)
-
-
Johnson, D.1
Menezes, A.2
-
6
-
-
37849048533
-
Efficient and robust pseudonymous authentication in vanet
-
New York, NY, USA: ACM
-
G. Calandriello, P. Papadimitratos, J.-P. Hubaux, and A. Lioy, "Efficient and robust pseudonymous authentication in vanet," in VANET '07: Proceedings of the fourth ACM international workshop on Vehicular ad hoc networks. New York, NY, USA: ACM, 2007, pp. 19-28.
-
(2007)
VANET '07: Proceedings of the Fourth ACM International Workshop on Vehicular Ad Hoc Networks
, pp. 19-28
-
-
Calandriello, G.1
Papadimitratos, P.2
Hubaux, J.-P.3
Lioy, A.4
-
8
-
-
33845564340
-
Securing vehicular communications
-
October
-
M. Raya, P. Papadimitratos, and J.-P. Hubaux, "Securing vehicular communications," Wireless Communications, IEEE, vol. 13, no. 5, pp. 8-15, October 2006.
-
(2006)
Wireless Communications, IEEE
, vol.13
, Issue.5
, pp. 8-15
-
-
Raya, M.1
Papadimitratos, P.2
Hubaux, J.-P.3
-
9
-
-
51349103067
-
Adaptive privacy-preserving authentication in vehicular networks
-
Oct.
-
K. Sha, Y. Xi, W. Shi, L. Schwiebert, and T. Zhang, "Adaptive privacy-preserving authentication in vehicular networks," In Proceedings of the First International Conference on Communications and Networking in China, 2006. ChinaCom '06., pp. 1-8, Oct. 2006.
-
(2006)
Proceedings of the First International Conference on Communications and Networking in China, 2006. ChinaCom '06
, pp. 1-8
-
-
Sha, K.1
Xi, Y.2
Shi, W.3
Schwiebert, L.4
Zhang, T.5
-
10
-
-
34547533155
-
-
March
-
Y. Xi, K. Sha, W. Shi, L. Schwiebert, and T. Zhang, "Enforcing privacy using symmetric random key-set in vehicular networks," March 2007, pp. 344-351.
-
(2007)
Enforcing Privacy Using Symmetric Random Key-set in Vehicular Networks
, pp. 344-351
-
-
Xi, Y.1
Sha, K.2
Shi, W.3
Schwiebert, L.4
Zhang, T.5
-
11
-
-
38549175291
-
Secure vehicular communications based on group signature and id-based signature scheme
-
X. Sun, X. Lin, and P.-H. Ho, "Secure vehicular communications based on group signature and id-based signature scheme," in Proceedings of IEEE International Conference on Communications, Glasgow, Scotland, 24-28 June 2007, pp. 1539-1545.
-
Proceedings of IEEE International Conference on Communications, Glasgow, Scotland, 24-28 June 2007
, pp. 1539-1545
-
-
Sun, X.1
Lin, X.2
Ho, P.-H.3
-
12
-
-
36749076982
-
Gsis: A secure and privacy-preserving protocol for vehicular communications
-
Nov.
-
X. Lin, X. Sun, P.-H. Ho, and X. Shen, "Gsis: A secure and privacy-preserving protocol for vehicular communications," Vehicular Technology, IEEE Transactions on, vol. 56, no. 6, pp. 3442-3456, Nov. 2007.
-
(2007)
Vehicular Technology, IEEE Transactions on
, vol.56
, Issue.6
, pp. 3442-3456
-
-
Lin, X.1
Sun, X.2
Ho, P.-H.3
Shen, X.4
-
13
-
-
33646820668
-
Efficient and provably-secure identity-based signatures and signcryption from bilinear maps
-
P. S. L. M. Barreto, B. Libert, N. McCullagh, and J.-J. Quisquater, "Efficient and provably-secure identity-based signatures and signcryption from bilinear maps," in ASIACRYPT, 2005, pp. 515-532.
-
(2005)
ASIACRYPT
, pp. 515-532
-
-
Barreto, P.S.L.M.1
Libert, B.2
McCullagh, N.3
Quisquater, J.-J.4
-
14
-
-
74549134073
-
Flexible, extensible, and efficient vanet authentication
-
Dec.
-
A. Studer, F. Bai, B. Bellur, and A. Perrig, "Flexible, extensible, and efficient vanet authentication," Journal of Communications and Networks, vol. 11, no. 6, pp. 574-588, Dec. 2009.
-
(2009)
Journal of Communications and Networks
, vol.11
, Issue.6
, pp. 574-588
-
-
Studer, A.1
Bai, F.2
Bellur, B.3
Perrig, A.4
-
15
-
-
0242426103
-
The tesla broadcast authentication protocol
-
A. Perrig, R. Canetti, J. D. Tygar, and D. Song, "The tesla broadcast authentication protocol," RSA CryptoBytes, vol. 5, pp. 2-13, 2002.
-
(2002)
RSA CryptoBytes
, vol.5
, pp. 2-13
-
-
Perrig, A.1
Canetti, R.2
Tygar, J.D.3
Song, D.4
-
16
-
-
77951599187
-
Real-world vanet security protocol performance
-
IEEE
-
J. J. Haas, Y.-C. Hu, and K. P. Laberteaux, "Real-world vanet security protocol performance." in GLOBECOM. IEEE, 2009, pp. 1-7.
-
(2009)
GLOBECOM
, pp. 1-7
-
-
Haas, J.J.1
Hu, Y.-C.2
Laberteaux, K.P.3
-
17
-
-
77951579132
-
A novel framework for message authentication in vehicular communication networks
-
IEEE
-
H. Wen, P.-H. Ho, and G. Gong, "A novel framework for message authentication in vehicular communication networks," in Global Telecommunications Conference, 2009. GLOBECOM 2009. IEEE, 2009, pp. 1-6.
-
(2009)
Global Telecommunications Conference, 2009. GLOBECOM 2009
, pp. 1-6
-
-
Wen, H.1
Ho, P.-H.2
Gong, G.3
-
18
-
-
80052417787
-
ASIC: Aggregate signatures and certificates verification scheme for vehicular networks
-
[Online]. Available
-
A. Wasef and X. Shen, "ASIC: Aggregate signatures and certificates verification scheme for vehicular networks," Engine, 2009. [Online]. Available: https://129.97.58.88/ojs-2.2/index.php/pptvt/article/view/487
-
(2009)
Engine
-
-
Wasef, A.1
Shen, X.2
-
19
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
New York, NY, USA: Springer-Verlag New York, Inc., [Online]. Available
-
A. Shamir, "Identity-based cryptosystems and signature schemes," in Proceedings of CRYPTO 84 on Advances in cryptology. New York, NY, USA: Springer-Verlag New York, Inc., 1985, pp. 47-53. [Online]. Available: http://portal.acm.org/citation.cfm?id=19478.19483
-
(1985)
Proceedings of CRYPTO 84 on Advances in Cryptology
, pp. 47-53
-
-
Shamir, A.1
-
20
-
-
77950151506
-
An identity based encryption scheme based on quadratic residues
-
Springer-Verlag
-
C. Cocks, "An identity based encryption scheme based on quadratic residues," in In IMA Int. Conf. Springer-Verlag, 2001, pp. 360-363.
-
(2001)
In IMA Int. Conf.
, pp. 360-363
-
-
Cocks, C.1
-
21
-
-
35248867510
-
Efficient identity based signature schemes based on pairings
-
SAC 2002, Springer-Verlag
-
F. Hess, "Efficient identity based signature schemes based on pairings," in SAC 2002, LNCS 2595. Springer-Verlag, 2002, pp. 310-324.
-
(2002)
LNCS
, vol.2595
, pp. 310-324
-
-
Hess, F.1
-
22
-
-
0037623983
-
Identity-based encryption from the weil pairing
-
March [Online]. Available
-
D. Boneh and M. Franklin, "Identity-based encryption from the weil pairing," SIAM J. Comput., vol. 32, pp. 586-615, March 2003. [Online]. Available: http://portal.acm.org/citation.cfm?id=639069.639089
-
(2003)
SIAM J. Comput.
, vol.32
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
23
-
-
0029717329
-
Proxy signatures for delegating signing operation
-
New York, NY, USA: ACM
-
M. Mambo, K. Usuda, and E. Okamoto, "Proxy signatures for delegating signing operation," in CCS '96: Proceedings of the 3rd ACM conference on Computer and communications security. New York, NY, USA: ACM, 1996, pp. 48-57.
-
(1996)
CCS '96: Proceedings of the 3rd ACM Conference on Computer and Communications Security
, pp. 48-57
-
-
Mambo, M.1
Usuda, K.2
Okamoto, E.3
-
24
-
-
0010567510
-
Proxy signatures, revisited
-
London, UK: Springer-Verlag
-
S. Kim, S. Park, and D. Won, "Proxy signatures, revisited," in ICICS '97: Proceedings of the First International Conference on Information and Communication Security. London, UK: Springer-Verlag, 1997, pp. 223-232.
-
(1997)
ICICS '97: Proceedings of the First International Conference on Information and Communication Security
, pp. 223-232
-
-
Kim, S.1
Park, S.2
Won, D.3
-
25
-
-
80052421820
-
Cryptanalysis of LKK proxy signature
-
Springer-Verlag
-
Z. Dong, L. Shengli, and C. Kefei, "Cryptanalysis of LKK proxy signature," in Progress on Cryptography. Springer-Verlag, 2004, pp. 161-164.
-
(2004)
Progress on Cryptography
, pp. 161-164
-
-
Dong, Z.1
Shengli, L.2
Kefei, C.3
-
26
-
-
20444371050
-
A new id-based proxy blind signature scheme
-
L. Wei-min, Y. Zong-kai, and C. Wen-qing, "A new id-based proxy blind signature scheme," Wuhan University Journal of Natural Sciences, vol. 10, no. 3, pp. 555-558, 2005.
-
(2005)
Wuhan University Journal of Natural Sciences
, vol.10
, Issue.3
, pp. 555-558
-
-
Wei-min, L.1
Zong-kai, Y.2
Wen-qing, C.3
-
27
-
-
47349088188
-
A multiple grade blind proxy signature scheme
-
M. Cai, L. Kang, and J. Jia, "A multiple grade blind proxy signature scheme," Intelligent Information Hiding and Multimedia Signal Processing, International Conference on, vol. 2, pp. 130-133, 2007.
-
(2007)
Intelligent Information Hiding and Multimedia Signal Processing, International Conference on
, vol.2
, pp. 130-133
-
-
Cai, M.1
Kang, L.2
Jia, J.3
-
28
-
-
52249117393
-
A proxy blind signature scheme with proxy revocation
-
vol. 0
-
J.-H. Park, Y.-S. Kim, and J. H. Chang, "A proxy blind signature scheme with proxy revocation," Computational Intelligence and Security Workshops, International Conference on, vol. 0, pp. 761-764, 2007.
-
(2007)
Computational Intelligence and Security Workshops, International Conference on
, pp. 761-764
-
-
Park, J.-H.1
Kim, Y.-S.2
Chang, J.H.3
-
29
-
-
67549144267
-
Design of proxy signature in ecdsa
-
Washington, DC, USA: IEEE Computer Society
-
M.-H. Chang, I.-T. Chen, and M.-T. Chen, "Design of proxy signature in ecdsa," in ISDA '08: Proceedings of the 2008 Eighth International Conference on Intelligent Systems Design and Applications. Washington, DC, USA: IEEE Computer Society, 2008, pp. 17-22.
-
(2008)
ISDA '08: Proceedings of the 2008 Eighth International Conference on Intelligent Systems Design and Applications
, pp. 17-22
-
-
Chang, M.-H.1
Chen, I.-T.2
Chen, M.-T.3
-
30
-
-
77950495933
-
An improved proxy signature scheme based on elliptic curve cryptography
-
Los Alamitos, CA, USA: IEEE Computer Society
-
X. Sun and M. Xia, "An improved proxy signature scheme based on elliptic curve cryptography," in Computer and Communications Security, International Conference on. Los Alamitos, CA, USA: IEEE Computer Society, 2009, pp. 88-91.
-
(2009)
Computer and Communications Security, International Conference on
, pp. 88-91
-
-
Sun, X.1
Xia, M.2
-
31
-
-
80052394012
-
An ecdlp-based threshold proxy signature scheme using self-certified public key system
-
Q. Xue, F. Li, Y. Zhou, J. Zhang, Z. Cao, and H. Qian, "An ecdlp-based threshold proxy signature scheme using self-certified public key system," in MobiSec, 2009, pp. 58-70.
-
(2009)
MobiSec
, pp. 58-70
-
-
Xue, Q.1
Li, F.2
Zhou, Y.3
Zhang, J.4
Cao, Z.5
Qian, H.6
-
32
-
-
77954362470
-
Proxy signature-based rsu message broadcasting in vanets
-
Kingston, ON, Canada: IEEE
-
S. Biswas and J. Misic, "Proxy signature-based rsu message broadcasting in vanets," in Proceedings of the 25th Biennial Symposium on Communications (QBSC), 2010. Kingston, ON, Canada: IEEE, 2010, pp. 5-9.
-
(2010)
Proceedings of the 25th Biennial Symposium on Communications (QBSC), 2010
, pp. 5-9
-
-
Biswas, S.1
Misic, J.2
-
33
-
-
80052419675
-
Establishing trust on vanet safety messages
-
Victoria, BC, Canada: Springer
-
-, "Establishing trust on vanet safety messages," in Proceedings of the Second International Conference on Ad Hoc Networks, 2010. Victoria, BC, Canada: Springer, 2010.
-
(2010)
Proceedings of the Second International Conference on Ad Hoc Networks, 2010
-
-
Biswas, S.1
Misic, J.2
-
35
-
-
63449088479
-
Efficient id-based blind signature and proxy signature from bilinear pairings
-
ser. ACISP'03. Berlin, Heidelberg: Springer-Verlag, [Online]. Available
-
F. Zhang and K. Kim, "Efficient id-based blind signature and proxy signature from bilinear pairings," in Proceedings of the 8th Australasian conference on Information security and privacy, ser. ACISP'03. Berlin, Heidelberg: Springer-Verlag, 2003, pp. 312-323. [Online]. Available: http://portal.acm.org/citation.cfm?id=1760479.1760514
-
(2003)
Proceedings of the 8th Australasian Conference on Information Security and Privacy
, pp. 312-323
-
-
Zhang, F.1
Kim, K.2
-
36
-
-
33646690058
-
Id-based proxy signature using bilinear pairings
-
Parallel and Distributed Processing and Applications - ISPA 2005 Workshops, ser. G. Chen, Y. Pan, M. Guo, and J. Lu, Eds. Springer Berlin / Heidelberg
-
J. Xu, Z. Zhang, and D. Feng, "Id-based proxy signature using bilinear pairings," in Parallel and Distributed Processing and Applications - ISPA 2005 Workshops, ser. Lecture Notes in Computer Science, G. Chen, Y. Pan, M. Guo, and J. Lu, Eds. Springer Berlin / Heidelberg, 2005, vol. 3759, pp. 359-367.
-
(2005)
Lecture Notes in Computer Science
, vol.3759
, pp. 359-367
-
-
Xu, J.1
Zhang, Z.2
Feng, D.3
-
37
-
-
54249111511
-
-
D. Pei, M. Yung, D. Lin, and C. Wu, Eds. Berlin, Heidelberg: Springer-Verlag, ch. An Efficient ID-Based Proxy Signature Scheme from Pairings
-
C. Gu and Y. Zhu, "Information security and cryptology," D. Pei, M. Yung, D. Lin, and C. Wu, Eds. Berlin, Heidelberg: Springer-Verlag, 2008, ch. An Efficient ID-Based Proxy Signature Scheme from Pairings, pp. 40-50.
-
(2008)
Information Security and Cryptology
, pp. 40-50
-
-
Gu, C.1
Zhu, Y.2
-
38
-
-
33947604535
-
Another id-based proxy signature scheme and its extension
-
10.1007/s11859-006-0162-6. [Online]. Available
-
J. Zhang and W. Zou, "Another id-based proxy signature scheme and its extension," Wuhan University Journal of Natural Sciences, vol. 12, pp. 33-36, 2007, 10.1007/s11859-006-0162-6. [Online]. Available: http://dx.doi.org/10.1007/s11859-006-0162-6
-
(2007)
Wuhan University Journal of Natural Sciences
, vol.12
, pp. 33-36
-
-
Zhang, J.1
Zou, W.2
-
39
-
-
38049022497
-
Identity-based proxy signature from pairings
-
Autonomic and Trusted Computing, 4th International Conference, ATC 2007, Hong Kong, China, July 11-13, 2007, Proceedings, ser. Springer
-
W. Wu, Y. Mu, W. Susilo, J. Seberry, and X. Huang, "Identity-based proxy signature from pairings," in Autonomic and Trusted Computing, 4th International Conference, ATC 2007, Hong Kong, China, July 11-13, 2007, Proceedings, ser. Lecture Notes in Computer Science, vol. 4610. Springer, 2007.
-
Lecture Notes in Computer Science
, vol.4610
, pp. 2007
-
-
Wu, W.1
Mu, Y.2
Susilo, W.3
Seberry, J.4
Huang, X.5
-
40
-
-
10844273272
-
A new efficient id-based proxy blind signature scheme
-
W. Lang, Y. Tan, Z. Yang, G. Liu, and B. Peng, "A new efficient id-based proxy blind signature scheme," Computers and Communications, IEEE Symposium on, vol. 1, pp. 407-411, 2004.
-
(2004)
Computers and Communications, IEEE Symposium on
, vol.1
, pp. 407-411
-
-
Lang, W.1
Tan, Y.2
Yang, Z.3
Liu, G.4
Peng, B.5
-
41
-
-
4644352655
-
Identity based proxy-signcryption scheme from pairings
-
vol. 0
-
X. Li and K. Chen, "Identity based proxy-signcryption scheme from pairings," Services Computing, IEEE International Conference on, vol. 0, pp. 494-497, 2004.
-
(2004)
Services Computing, IEEE International Conference on
, pp. 494-497
-
-
Li, X.1
Chen, K.2
-
42
-
-
3042601975
-
Id-based proxy blind signature
-
Z. Dong, H. Zheng, K. Chen, and W. Kou, "Id-based proxy blind signature," Advanced Information Networking and Applications, International Conference on, vol. 2, p. 380, 2004.
-
(2004)
Advanced Information Networking and Applications, International Conference on
, vol.2
, pp. 380
-
-
Dong, Z.1
Zheng, H.2
Chen, K.3
Kou, W.4
-
43
-
-
53249117524
-
Pairings for cryptographers
-
September [Online]. Available
-
S. D. Galbraith, K. G. Paterson, and N. P. Smart, "Pairings for cryptographers," Discrete Appl. Math., vol. 156, pp. 3113-3121, September 2008. [Online]. Available: http://portal.acm.org/citation.cfm?id=1450345.1450543
-
(2008)
Discrete Appl. Math.
, vol.156
, pp. 3113-3121
-
-
Galbraith, S.D.1
Paterson, K.G.2
Smart, N.P.3
-
44
-
-
34347393777
-
Identity-based key agreement protocols from pairings
-
June [Online]. Available
-
L. Chen, Z. Cheng, and N. P. Smart, "Identity-based key agreement protocols from pairings," Int. J. Inf. Secur., vol. 6, pp. 213-241, June 2007. [Online]. Available: http://portal.acm.org/citation.cfm?id=1272509.1272511
-
(2007)
Int. J. Inf. Secur.
, vol.6
, pp. 213-241
-
-
Chen, L.1
Cheng, Z.2
Smart, N.P.3
-
45
-
-
1642614204
-
Digital proxy blind signature schemes based on
-
Z. Tan, Z. Liu, and C. Tang, "Digital proxy blind signature schemes based on," in DLP and ECDLP, MM Research Preprints, 2002, pp. 212-217.
-
(2002)
DLP and ECDLP, MM Research Preprints
, pp. 212-217
-
-
Tan, Z.1
Liu, Z.2
Tang, C.3
-
46
-
-
77949701460
-
An improved proxy blind signature scheme based on factoring and ecdlp
-
C. Qi and Y. Wang, "An improved proxy blind signature scheme based on factoring and ecdlp," in Computational Intelligence and Software Engineering, 2009. CiSE 2009. International Conference on, Wuhan, China, 2009, pp. 1-4.
-
(2009)
Computational Intelligence and Software Engineering, 2009. CiSE 2009. International Conference On, Wuhan, China
, pp. 1-4
-
-
Qi, C.1
Wang, Y.2
-
47
-
-
77953193083
-
An identity based digital signature from ecdsa
-
H. Jin, H. Debiao, and C. Jianhua, "An identity based digital signature from ecdsa," Education Technology and Computer Science, International Workshop on, vol. 1, pp. 627-630, 2010.
-
(2010)
Education Technology and Computer Science, International Workshop on
, vol.1
, pp. 627-630
-
-
Jin, H.1
Debiao, H.2
Jianhua, C.3
|