메뉴 건너뛰기




Volumn , Issue , 2012, Pages 345-350

A novel ID-based authentication framework with adaptive privacy preservation for VANETs

Author keywords

IBS IBOOS schemes; ID based authentication; pseudonym based privacy preservation; VANETs

Indexed keywords

IBS/IBOOS SCHEMES; ID BASED SIGNATURE; ID-BASED; PRIVACY ISSUE; PRIVACY PRESERVATION; PRIVATE DATA; SECURITY REQUIREMENTS; SYSTEM EVALUATION; VANETS;

EID: 84860436171     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ComComAp.2012.6154869     Document Type: Conference Paper
Times cited : (87)

References (21)
  • 2
    • 39449084181 scopus 로고    scopus 로고
    • Routing in vehicular ad hoc networks: A survey
    • F. Li and Y. Wang, "Routing in vehicular ad hoc networks: A survey," IEEE Vehicular Technology Magazine, vol. 2, no. 2, pp. 12-22, 2007.
    • (2007) IEEE Vehicular Technology Magazine , vol.2 , Issue.2 , pp. 12-22
    • Li, F.1    Wang, Y.2
  • 3
    • 84966477020 scopus 로고    scopus 로고
    • IEEE 1609 Family of Standards for Wireless Access in Vehicular Environments (WAVE)
    • U.S. Department of Transportation, Available
    • "IEEE 1609 Family of Standards for Wireless Access in Vehicular Environments (WAVE)," U.S. Department of Transportation, 2009. Available: IEEE Standards
    • (2009) IEEE Standards
  • 4
    • 33845726678 scopus 로고    scopus 로고
    • Securing vehicular ad hoc networks
    • M. Raya and J. Pierre, "Securing vehicular ad hoc networks," Journal of Computer Security, vol. 15, no. 1, pp. 39-68, 2007.
    • (2007) Journal of Computer Security , vol.15 , Issue.1 , pp. 39-68
    • Raya, M.1    Pierre, J.2
  • 5
    • 46749114124 scopus 로고    scopus 로고
    • A novel secure communication scheme in vehicular ad hoc networks
    • N.-W. Wang, Y.-M. Huang, and W.-M. Chen, "A novel secure communication scheme in vehicular ad hoc networks," Computer Communications, vol. 31, pp. 2827-2837, 2008.
    • (2008) Computer Communications , vol.31 , pp. 2827-2837
    • Wang, N.-W.1    Huang, Y.-M.2    Chen, W.-M.3
  • 6
    • 77649280675 scopus 로고    scopus 로고
    • Secure, pseudonymous, and auditable communication in vehicular ad hoc networks
    • P. Kamat, A. Baliga, and W. Trappe, "Secure, pseudonymous, and auditable communication in vehicular ad hoc networks," Security and Communication Networks, vol. 1, no. 3, pp. 233-244, 2008.
    • (2008) Security and Communication Networks , vol.1 , Issue.3 , pp. 233-244
    • Kamat, P.1    Baliga, A.2    Trappe, W.3
  • 7
    • 36749076982 scopus 로고    scopus 로고
    • GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications
    • X. Lin, X. Sun, P.-H. Ho, and X. Shen, "GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications," IEEE Transactions on Vehicular Technology, vol. 56, no. 6, pp. 3442-3456, 2007.
    • (2007) IEEE Transactions on Vehicular Technology , vol.56 , Issue.6 , pp. 3442-3456
    • Lin, X.1    Sun, X.2    Ho, P.-H.3    Shen, X.4
  • 8
    • 77955229114 scopus 로고    scopus 로고
    • An Identity-Based Security System for User Privacy in Vehicular Ad Hoc Networks
    • J. Sun, C. Zhang, Y. Zhang, and Y. Fang, "An Identity-Based Security System for User Privacy in Vehicular Ad Hoc Networks," IEEE Transactions on Parallel and Distributed Systems, vol. 21, no. 9, pp. 1227-1239, 2010.
    • (2010) IEEE Transactions on Parallel and Distributed Systems , vol.21 , Issue.9 , pp. 1227-1239
    • Sun, J.1    Zhang, C.2    Zhang, Y.3    Fang, Y.4
  • 9
    • 85028913061 scopus 로고
    • On-Line/Off-Line Digital Signatures
    • Adv. in Cryptology - CRYPTO'89
    • S. Even, O. Goldreich, and S. Micali, "On-Line/Off-Line Digital Signatures," in Adv. in Cryptology - CRYPTO'89, LNCS, vol. 435, 1990.
    • (1990) LNCS , vol.435
    • Even, S.1    Goldreich, O.2    Micali, S.3
  • 13
    • 84874324906 scopus 로고    scopus 로고
    • Identity-Based Encryption from the Weil Pairing
    • Adv. in Cryptology - CRYPTO 2001
    • D. Boneh and M. Franklin, "Identity-Based Encryption from the Weil Pairing," in Adv. in Cryptology - CRYPTO 2001, LNCS, vol. 2139, 2001.
    • (2001) LNCS , vol.2139
    • Boneh, D.1    Franklin, M.2
  • 14
    • 84937428623 scopus 로고    scopus 로고
    • Efficient Algorithms for Pairing-Based Cryptosystems
    • Adv. in Cryptology - CRYPTO 2002
    • P. Barreto, H. Kim, B. Lynn, and M. Scott, "Efficient Algorithms for Pairing-Based Cryptosystems," in Adv. in Cryptology - CRYPTO 2002, LNCS, vol. 2442, 2002.
    • (2002) LNCS , vol.2442
    • Barreto, P.1    Kim, H.2    Lynn, B.3    Scott, M.4
  • 15
    • 85020598353 scopus 로고
    • Identity-Based Cryptosystems and Signature Schemes
    • Adv. in Cryptology - CRYPTO'84
    • A. Shamir, "Identity-Based Cryptosystems and Signature Schemes," in Adv. in Cryptology - CRYPTO'84, LNCS, vol. 196, 1985.
    • (1985) LNCS , vol.196
    • Shamir, A.1
  • 16
    • 84880883264 scopus 로고    scopus 로고
    • Improved Online/Offline Signature Schemes
    • Adv. in Cryptology - CRYPTO 2001
    • A. Shamir and Y. Tauman, "Improved Online/Offline Signature Schemes," in Adv. in Cryptology - CRYPTO 2001, LNCS, vol. 2139, 2001.
    • (2001) LNCS , vol.2139
    • Shamir, A.1    Tauman, Y.2
  • 17
    • 35048818581 scopus 로고    scopus 로고
    • Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs
    • Cryptographic Hardware and Embedded Systems - CHES 2004
    • N. Gura, A. Patel, A. Wander, H. Eberle, and S. C. Shantz, "Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs," in Cryptographic Hardware and Embedded Systems - CHES 2004, LNCS, vol. 3156, 2004.
    • (2004) LNCS , vol.3156
    • Gura, N.1    Patel, A.2    Wander, A.3    Eberle, H.4    Shantz, S.C.5
  • 18
    • 23044435711 scopus 로고    scopus 로고
    • Short Signatures from the Weil Pairing
    • D. Boneh, B. Lynn, and H. Shacham, "Short Signatures from the Weil Pairing," Journal of Cryptology, vol. 17, pp. 297-319, 2004.
    • (2004) Journal of Cryptology , vol.17 , pp. 297-319
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 19
    • 33744918078 scopus 로고    scopus 로고
    • Efficient Authentication Scheme for Routing in Mobile Ad Hoc Networks
    • Embedded and Ubiquitous Computing - EUC 2005 Workshops
    • S. Xu, Y. Mu, and W. Susilo, "Efficient Authentication Scheme for Routing in Mobile Ad Hoc Networks," in Embedded and Ubiquitous Computing - EUC 2005 Workshops, LNCS, vol. 3823, 2005.
    • (2005) LNCS , vol.3823
    • Xu, S.1    Mu, Y.2    Susilo, W.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.