-
1
-
-
80053103238
-
-
Strong VANET security on a budget. In Proceedings of Workshop on Embedded Security in Cars (ESCAR)
-
Hu Y-C, Laberteaux KP. Strong VANET security on a budget. In Proceedings of Workshop on Embedded Security in Cars (ESCAR), 2006.
-
(2006)
-
-
Hu, Y.-C.1
Laberteaux, K.P.2
-
2
-
-
57049158815
-
Probabilistic adaptive anonymous authentication in vehicular networks
-
Xi Y, Sha KW, Shi W-S, Schwiebert L, Zhang T. Probabilistic adaptive anonymous authentication in vehicular networks. Journal of Computer Science and Technology 2008; 23(6): 916-928.
-
(2008)
Journal of Computer Science and Technology
, vol.23
, Issue.6
, pp. 916-928
-
-
Xi, Y.1
Sha, K.W.2
Shi, W.-S.3
Schwiebert, L.4
Zhang, T.5
-
3
-
-
39449084181
-
Routing in vehicular ad hoc networks: a survey
-
Li F, Wang Y. Routing in vehicular ad hoc networks: a survey. IEEE Vehicular Technology Magazine 2007; 2(2): 12-22.
-
(2007)
IEEE Vehicular Technology Magazine
, vol.2
, Issue.2
, pp. 12-22
-
-
Li, F.1
Wang, Y.2
-
5
-
-
42649121690
-
Security in vehicular ad hoc networks
-
Lin X, Lu R, Zhang C, Zhu H, Ho P-H, Shen X. Security in vehicular ad hoc networks. IEEE Communications Magazine 2008; 46(4): 88-95.
-
(2008)
IEEE Communications Magazine
, vol.46
, Issue.4
, pp. 88-95
-
-
Lin, X.1
Lu, R.2
Zhang, C.3
Zhu, H.4
Ho, P.-H.5
Shen, X.6
-
6
-
-
80053101985
-
-
IEEE Std. 1609.2. IEEE Trial-Use Standard for Wireless Access in Vehicular Environments-Security Services for Applications and Management Messages.
-
IEEE Std. 1609.2. IEEE Trial-Use Standard for Wireless Access in Vehicular Environments-Security Services for Applications and Management Messages. 2006.
-
(2006)
-
-
-
7
-
-
57049129831
-
An efficient message authentication scheme for vehicular communications
-
Zhang C, Lin X, Lu R, Ho P-H, Shen X. An efficient message authentication scheme for vehicular communications. IEEE Transactions on Vehicular Technology 2008; 57(6): 3357-3368.
-
(2008)
IEEE Transactions on Vehicular Technology
, vol.57
, Issue.6
, pp. 3357-3368
-
-
Zhang, C.1
Lin, X.2
Lu, R.3
Ho, P.-H.4
Shen, X.5
-
8
-
-
14844309671
-
-
Group signatures with verifier-local revocation. In Proceedings of the 11th ACM Conference on Computer and Communications Security
-
Boneh D, Shacham H. Group signatures with verifier-local revocation. In Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004; 168-177.
-
(2004)
, pp. 168-177
-
-
Boneh, D.1
Shacham, H.2
-
9
-
-
45749125686
-
PPAA: peer-to-peer anonymous authentication
-
Springer, Beijing, China
-
Tsang PP, Smith SW. PPAA: peer-to-peer anonymous authentication. In Applied Cryptography and Network Security, Lecture Notes in Computer Science, Springer, Beijing, China, 2008.
-
(2008)
Applied Cryptography and Network Security, Lecture Notes in Computer Science
-
-
Tsang, P.P.1
Smith, S.W.2
-
10
-
-
74549134073
-
Flexible, extensible, and efficient VANET authentication
-
Special Issue on Secure Wireless Networks
-
Studer A, Bai F, Bellur B, Perrig A. Flexible, extensible, and efficient VANET authentication. Journal of Communications and Networks (JCN), Special Issue on Secure Wireless Networks 2009; 11(6).
-
(2009)
Journal of Communications and Networks (JCN)
, vol.11
, Issue.6
-
-
Studer, A.1
Bai, F.2
Bellur, B.3
Perrig, A.4
-
11
-
-
37849048533
-
-
VANET '07, Montreal, Quebec, Canada
-
Calandriello G, Papadimitratos P, Hubaux J-P, Lioy A. Efficient and robust pseudonymous authentication in VANET. In VANET '07, Montreal, Quebec, Canada, 2007; 19-27.
-
(2007)
Efficient and robust pseudonymous authentication in VANET
, pp. 19-27
-
-
Calandriello, G.1
Papadimitratos, P.2
Hubaux, J.-P.3
Lioy, A.4
-
12
-
-
34247374798
-
-
VANET '06, Los Angeles, California, USA
-
Kamat P, Baliga A, Trappe W. An identity-based security framework For VANETs. In VANET '06, Los Angeles, California, USA, 2006; 94-95.
-
(2006)
An identity-based security framework For VANETs
, pp. 94-95
-
-
Kamat, P.1
Baliga, A.2
Trappe, W.3
-
13
-
-
70449565205
-
-
TACKing together efficient authentication, revocation, and privacy in VANETs. Proceedings of the 6th Annual IEEE Communications Society Conference on Sensor, Mesh, and Ad Hoc Communications and Networks (SECON 2009)
-
Studer A, Shi E, Bai F, Perrig A. TACKing together efficient authentication, revocation, and privacy in VANETs. Proceedings of the 6th Annual IEEE Communications Society Conference on Sensor, Mesh, and Ad Hoc Communications and Networks (SECON 2009), 2009.
-
(2009)
-
-
Studer, A.1
Shi, E.2
Bai, F.3
Perrig, A.4
-
14
-
-
36749076982
-
GSIS: a secure and privacy-preserving protocol for vehicular communications
-
Lin X, Sun X, Ho P, Shen X. GSIS: a secure and privacy-preserving protocol for vehicular communications. IEEE Transactions on Vehicular Technology 2007; 56: 3442-3456.
-
(2007)
IEEE Transactions on Vehicular Technology
, vol.56
, pp. 3442-3456
-
-
Lin, X.1
Sun, X.2
Ho, P.3
Shen, X.4
-
15
-
-
80053116803
-
-
Secure revocable anonymous authenticated inter-vehicle communication (SRAAC). In Proceedings of Workshop on Embedded Security in Cars (ESCAR)
-
Fischer L, Aijaz A, Eckert C, Vogt D. Secure revocable anonymous authenticated inter-vehicle communication (SRAAC). In Proceedings of Workshop on Embedded Security in Cars (ESCAR), 2006.
-
(2006)
-
-
Fischer, L.1
Aijaz, A.2
Eckert, C.3
Vogt, D.4
-
16
-
-
85020598353
-
Identity-based cryptosystems and signature scheme
-
Shamir A. Identity-based cryptosystems and signature scheme. In Advances in Cryptology-CRYPTO '84 1985; 196 47-53.
-
(1985)
Advances in Cryptology-CRYPTO '84
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
17
-
-
51249107509
-
PPGCV: privacy preserving group communications protocol for vehicular ad hoc networks
-
Wasef A, Shen X. PPGCV: privacy preserving group communications protocol for vehicular ad hoc networks. Proceedings of ICC, 2008; 1458-1463.
-
(2008)
Proceedings of ICC
, pp. 1458-1463
-
-
Wasef, A.1
Shen, X.2
-
18
-
-
80053120827
-
-
TARI: meeting delay requirements in VANETs with efficient authentication and revocation. In 2nd International Conference on Wireless Access in Vehicular Environments (WAVE), December
-
Chen R, Ma D, Regan A. TARI: meeting delay requirements in VANETs with efficient authentication and revocation. In 2nd International Conference on Wireless Access in Vehicular Environments (WAVE), December 2009.
-
(2009)
-
-
Chen, R.1
Ma, D.2
Regan, A.3
-
21
-
-
51049121311
-
-
Efficient mechanisms to provide convoy member and vehicle sequence authentication in VANETs. In Proceedings of 3rd International Conference on Security and Privacy in Communications Networks (SecureComm), September.
-
Studer A, Luk M, Perrig A. Efficient mechanisms to provide convoy member and vehicle sequence authentication in VANETs. In Proceedings of 3rd International Conference on Security and Privacy in Communications Networks (SecureComm), September 2007; 422-432.
-
(2007)
, pp. 422-432
-
-
Studer, A.1
Luk, M.2
Perrig, A.3
-
22
-
-
84947618007
-
-
The Network Simulator---ns-2. Available at:
-
The Network Simulator---ns-2. Available at:.
-
-
-
-
23
-
-
84947618138
-
-
Java-based simulation system. Available at:
-
Java-based simulation system. Available at:.
-
-
-
|