-
1
-
-
83055180896
-
Vehicular ad hoc networks (VANETS): Status, results, and Challenges
-
S. Zeadally, R. Hunt, Y.-S. Chen, A. Irwin, and A. Hassan, "Vehicular ad hoc networks (VANETS): status, results, and Challenges," Telecommunication Systems (Online First), pp. 1-25, 2010.
-
(2010)
Telecommunication Systems (Online First)
, pp. 1-25
-
-
Zeadally, S.1
Hunt, R.2
Chen, Y.-S.3
Irwin, A.4
Hassan, A.5
-
2
-
-
39449084181
-
Routing in vehicular ad hoc networks: A survey
-
F. Li and Y. Wang, "Routing in vehicular ad hoc networks: A survey," IEEE Vehicular Technology Magazine, vol. 2, no. 2, pp. 12-22, 2007.
-
(2007)
IEEE Vehicular Technology Magazine
, vol.2
, Issue.2
, pp. 12-22
-
-
Li, F.1
Wang, Y.2
-
3
-
-
84966477020
-
IEEE 1609 Family of Standards for Wireless Access in Vehicular Environments (WAVE)
-
U.S. Department of Transportation, Available
-
"IEEE 1609 Family of Standards for Wireless Access in Vehicular Environments (WAVE)," U.S. Department of Transportation, 2009. Available: IEEE Standards
-
(2009)
IEEE Standards
-
-
-
4
-
-
33845726678
-
Securing vehicular ad hoc networks
-
M. Raya and J. Pierre, "Securing vehicular ad hoc networks," Journal of Computer Security, vol. 15, no. 1, pp. 39-68, 2007.
-
(2007)
Journal of Computer Security
, vol.15
, Issue.1
, pp. 39-68
-
-
Raya, M.1
Pierre, J.2
-
5
-
-
46749114124
-
A novel secure communication scheme in vehicular ad hoc networks
-
N.-W. Wang, Y.-M. Huang, and W.-M. Chen, "A novel secure communication scheme in vehicular ad hoc networks," Computer Communications, vol. 31, pp. 2827-2837, 2008.
-
(2008)
Computer Communications
, vol.31
, pp. 2827-2837
-
-
Wang, N.-W.1
Huang, Y.-M.2
Chen, W.-M.3
-
6
-
-
77649280675
-
Secure, pseudonymous, and auditable communication in vehicular ad hoc networks
-
P. Kamat, A. Baliga, and W. Trappe, "Secure, pseudonymous, and auditable communication in vehicular ad hoc networks," Security and Communication Networks, vol. 1, no. 3, pp. 233-244, 2008.
-
(2008)
Security and Communication Networks
, vol.1
, Issue.3
, pp. 233-244
-
-
Kamat, P.1
Baliga, A.2
Trappe, W.3
-
7
-
-
36749076982
-
GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications
-
X. Lin, X. Sun, P.-H. Ho, and X. Shen, "GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications," IEEE Transactions on Vehicular Technology, vol. 56, no. 6, pp. 3442-3456, 2007.
-
(2007)
IEEE Transactions on Vehicular Technology
, vol.56
, Issue.6
, pp. 3442-3456
-
-
Lin, X.1
Sun, X.2
Ho, P.-H.3
Shen, X.4
-
8
-
-
77955229114
-
An Identity-Based Security System for User Privacy in Vehicular Ad Hoc Networks
-
J. Sun, C. Zhang, Y. Zhang, and Y. Fang, "An Identity-Based Security System for User Privacy in Vehicular Ad Hoc Networks," IEEE Transactions on Parallel and Distributed Systems, vol. 21, no. 9, pp. 1227-1239, 2010.
-
(2010)
IEEE Transactions on Parallel and Distributed Systems
, vol.21
, Issue.9
, pp. 1227-1239
-
-
Sun, J.1
Zhang, C.2
Zhang, Y.3
Fang, Y.4
-
9
-
-
85028913061
-
On-Line/Off-Line Digital Signatures
-
Adv. in Cryptology - CRYPTO'89
-
S. Even, O. Goldreich, and S. Micali, "On-Line/Off-Line Digital Signatures," in Adv. in Cryptology - CRYPTO'89, LNCS, vol. 435, 1990.
-
(1990)
LNCS
, vol.435
-
-
Even, S.1
Goldreich, O.2
Micali, S.3
-
10
-
-
84860489121
-
Privacy Issues of Vehicular Ad-Hoc Networks
-
H. Dok, H. Fu, R. Echevarria, and H. Weerasinghe, "Privacy Issues of Vehicular Ad-Hoc Networks," Int'l Journal of Future Generation Communication and Networking, vol. 3, no. 1, pp. 17-32, 2010.
-
(2010)
Int'l Journal of Future Generation Communication and Networking
, vol.3
, Issue.1
, pp. 17-32
-
-
Dok, H.1
Fu, H.2
Echevarria, R.3
Weerasinghe, H.4
-
12
-
-
84860484263
-
Overview of Security Issues in Vehicular Ad-hoc Networks
-
IGI Global
-
J. M. D. Fuentes, A. I. González-Tablas, and A. Ribagorda, "Overview of Security Issues in Vehicular Ad-hoc Networks," in Handbook of Research on Mobility and Computing: Evolving Technologies and Ubiquitous Impacts. IGI Global, 2011, pp. 894-911.
-
(2011)
Handbook of Research on Mobility and Computing: Evolving Technologies and Ubiquitous Impacts
, pp. 894-911
-
-
Fuentes, J.M.D.1
González-Tablas, A.I.2
Ribagorda, A.3
-
13
-
-
84874324906
-
Identity-Based Encryption from the Weil Pairing
-
Adv. in Cryptology - CRYPTO 2001
-
D. Boneh and M. Franklin, "Identity-Based Encryption from the Weil Pairing," in Adv. in Cryptology - CRYPTO 2001, LNCS, vol. 2139, 2001.
-
(2001)
LNCS
, vol.2139
-
-
Boneh, D.1
Franklin, M.2
-
14
-
-
84937428623
-
Efficient Algorithms for Pairing-Based Cryptosystems
-
Adv. in Cryptology - CRYPTO 2002
-
P. Barreto, H. Kim, B. Lynn, and M. Scott, "Efficient Algorithms for Pairing-Based Cryptosystems," in Adv. in Cryptology - CRYPTO 2002, LNCS, vol. 2442, 2002.
-
(2002)
LNCS
, vol.2442
-
-
Barreto, P.1
Kim, H.2
Lynn, B.3
Scott, M.4
-
15
-
-
85020598353
-
Identity-Based Cryptosystems and Signature Schemes
-
Adv. in Cryptology - CRYPTO'84
-
A. Shamir, "Identity-Based Cryptosystems and Signature Schemes," in Adv. in Cryptology - CRYPTO'84, LNCS, vol. 196, 1985.
-
(1985)
LNCS
, vol.196
-
-
Shamir, A.1
-
16
-
-
84880883264
-
Improved Online/Offline Signature Schemes
-
Adv. in Cryptology - CRYPTO 2001
-
A. Shamir and Y. Tauman, "Improved Online/Offline Signature Schemes," in Adv. in Cryptology - CRYPTO 2001, LNCS, vol. 2139, 2001.
-
(2001)
LNCS
, vol.2139
-
-
Shamir, A.1
Tauman, Y.2
-
17
-
-
35048818581
-
Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs
-
Cryptographic Hardware and Embedded Systems - CHES 2004
-
N. Gura, A. Patel, A. Wander, H. Eberle, and S. C. Shantz, "Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs," in Cryptographic Hardware and Embedded Systems - CHES 2004, LNCS, vol. 3156, 2004.
-
(2004)
LNCS
, vol.3156
-
-
Gura, N.1
Patel, A.2
Wander, A.3
Eberle, H.4
Shantz, S.C.5
-
18
-
-
23044435711
-
Short Signatures from the Weil Pairing
-
D. Boneh, B. Lynn, and H. Shacham, "Short Signatures from the Weil Pairing," Journal of Cryptology, vol. 17, pp. 297-319, 2004.
-
(2004)
Journal of Cryptology
, vol.17
, pp. 297-319
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
19
-
-
33744918078
-
Efficient Authentication Scheme for Routing in Mobile Ad Hoc Networks
-
Embedded and Ubiquitous Computing - EUC 2005 Workshops
-
S. Xu, Y. Mu, and W. Susilo, "Efficient Authentication Scheme for Routing in Mobile Ad Hoc Networks," in Embedded and Ubiquitous Computing - EUC 2005 Workshops, LNCS, vol. 3823, 2005.
-
(2005)
LNCS
, vol.3823
-
-
Xu, S.1
Mu, Y.2
Susilo, W.3
-
20
-
-
51449098979
-
An Efficient Identity-Based Batch Verification Scheme for Vehicular Sensor Networks
-
C. Zhang, R. Lu, X. Lin, P.-H. Ho, and X. Shen, "An Efficient Identity-Based Batch Verification Scheme for Vehicular Sensor Networks,"in Proc. of IEEE 27th Conference on Computer Communications, INFOCOM 2008, 2008.
-
Proc. of IEEE 27th Conference on Computer Communications, INFOCOM 2008, 2008
-
-
Zhang, C.1
Lu, R.2
Lin, X.3
Ho, P.-H.4
Shen, X.5
-
21
-
-
84871219733
-
Mitigating phishing with ID-based online/offline authentication
-
Q. Ren, Y. Mu, and W. Susilo, "Mitigating phishing with ID-based online/offline authentication," in Proc. of the sixth Australasian conference on Information security, AISC'08, 2008.
-
Proc. of the Sixth Australasian Conference on Information Security, AISC'08, 2008
-
-
Ren, Q.1
Mu, Y.2
Susilo, W.3
|