메뉴 건너뛰기




Volumn , Issue , 2012, Pages 85-93

A group signature based electronic toll pricing system

Author keywords

Electronic Toll Pricing; location privacy; unlinkability

Indexed keywords

COMPUTATION OVERHEADS; GROUP SIGNATURES; LOCATION BASED; LOCATION PRIVACY; PRICING SYSTEMS; SYSTEM DESIGNERS; TOLL PRICING; UNLINKABILITY; USER DEVICES; VEHICLE SERVICE;

EID: 84869403069     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ARES.2012.67     Document Type: Conference Paper
Times cited : (23)

References (21)
  • 1
    • 70350375841 scopus 로고    scopus 로고
    • PriPAYD: Privacy friendly pay-as-you-drive insurance
    • ACM
    • C. Troncoso, G. Danezis, E. Kosta, and B. Preneel, "PriPAYD: Privacy friendly pay-as-you-drive insurance," in Proc. WPES. ACM, 2007, pp. 99-107.
    • (2007) Proc. WPES , pp. 99-107
    • Troncoso, C.1    Danezis, G.2    Kosta, E.3    Preneel, B.4
  • 2
    • 77955303955 scopus 로고    scopus 로고
    • Measuring long-term location privacy in vehicular communication systems
    • Z. Ma, F. Kargl, and M. Weber, "Measuring long-term location privacy in vehicular communication systems," Computer Communications, vol. 33, no. 12, pp. 1414-1427, 2010.
    • (2010) Computer Communications , vol.33 , Issue.12 , pp. 1414-1427
    • Ma, Z.1    Kargl, F.2    Weber, M.3
  • 3
    • 67650699523 scopus 로고    scopus 로고
    • Privacy-friendly electronic traffic pricing via commits
    • Proc. FAST, ser. Springer
    • W. de Jonge and B. Jacobs, "Privacy-friendly electronic traffic pricing via commits," in Proc. FAST, ser. LNCS, vol. 5491. Springer, 2008, pp. 143-161.
    • (2008) LNCS , vol.5491 , pp. 143-161
    • De Jonge, W.1    Jacobs, B.2
  • 4
    • 84946418789 scopus 로고    scopus 로고
    • VPriv: Protecting privacy in location-based vehicular services
    • USENIX Association
    • R. A. Popa, H. Balakrishnan, and A. J. Blumberg, "VPriv: Protecting privacy in location-based vehicular services," in Proc. USENIX Security Symposium. USENIX Association, 2009, pp. 335-350.
    • (2009) Proc. USENIX Security Symposium , pp. 335-350
    • Popa, R.A.1    Balakrishnan, H.2    Blumberg, A.J.3
  • 6
    • 84861448126 scopus 로고    scopus 로고
    • Cell-based roadpricing
    • Proc. EuroPKI, ser. Springer
    • F. Garcia, E. Verheul, and B. Jacobs, "Cell-based roadpricing," in Proc. EuroPKI, ser. LNCS, vol. 7163. Springer, 2011, pp. 106-122.
    • (2011) LNCS , vol.7163 , pp. 106-122
    • Garcia, F.1    Verheul, E.2    Jacobs, B.3
  • 7
    • 85076493348 scopus 로고    scopus 로고
    • The phantom tollbooth: Privacy-preserving electronic toll collection in the presence of driver collusion
    • USENIX Association
    • S. Meiklejohn, K. Mowery, S. Checkoway, and H. Shacham, "The phantom tollbooth: Privacy-preserving electronic toll collection in the presence of driver collusion," in Proc. USENIX Security Symposium. USENIX Association, 2011.
    • (2011) Proc. USENIX Security Symposium
    • Meiklejohn, S.1    Mowery, K.2    Checkoway, S.3    Shacham, H.4
  • 9
    • 33750879264 scopus 로고    scopus 로고
    • Enhancing security and privacy in traffic-monitoring systems
    • B. Hoh, M. Gruteser, H. Xiong, and A. Alrabady, "Enhancing security and privacy in traffic-monitoring systems," IEEE Pervasive Computing, vol. 5, no. 4, pp. 38-46, 2006.
    • (2006) IEEE Pervasive Computing , vol.5 , Issue.4 , pp. 38-46
    • Hoh, B.1    Gruteser, M.2    Xiong, H.3    Alrabady, A.4
  • 10
    • 57349108972 scopus 로고    scopus 로고
    • Preserving privacy in GPS traces via uncertainty-aware path cloaking
    • ACM
    • -, "Preserving privacy in GPS traces via uncertainty-aware path cloaking," in Proc. CCS. ACM, 2007, pp. 161-171.
    • (2007) Proc. CCS , pp. 161-171
    • Hoh, B.1    Gruteser, M.2    Xiong, H.3    Alrabady, A.4
  • 12
    • 38049035427 scopus 로고    scopus 로고
    • Inference attacks on location tracks
    • Proc. Pervasive, ser. Springer
    • J. Krumm, "Inference attacks on location tracks," in Proc. Pervasive, ser. LNCS, vol. 4480. Springer, 2007, pp. 127-143.
    • (2007) LNCS , vol.4480 , pp. 127-143
    • Krumm, J.1
  • 13
    • 85024290278 scopus 로고
    • Group signatures
    • Proc. EUROCRYPT, ser. Springer
    • D. Chaum and E. van Heyst, "Group signatures," in Proc. EUROCRYPT, ser. LNCS, vol. 547. Springer, 1991, pp. 257-265.
    • (1991) LNCS , vol.547 , pp. 257-265
    • Chaum, D.1    Van Heyst, E.2
  • 14
    • 24144477851 scopus 로고    scopus 로고
    • Foundations of group signatures: The case of dynamic groups
    • Proc. CT-RSA, ser. Springer
    • M. Bellare, H. Shi, and C. Zhang, "Foundations of group signatures: The case of dynamic groups," in Proc. CT-RSA, ser. LNCS, vol. 3376. Springer, 2005, pp. 136-153.
    • (2005) LNCS , vol.3376 , pp. 136-153
    • Bellare, M.1    Shi, H.2    Zhang, C.3
  • 15
    • 77958078296 scopus 로고    scopus 로고
    • Group message authentication
    • Proc. SCN, ser. Springer
    • B. Przydatek and D. Wikström, "Group message authentication," in Proc. SCN, ser. LNCS, vol. 6280. Springer, 2010, pp. 399-417.
    • (2010) LNCS , vol.6280 , pp. 399-417
    • Przydatek, B.1    Wikström, D.2
  • 16
    • 79959315979 scopus 로고    scopus 로고
    • Double-trapdoor anonymous tags for traceable signatures
    • Proc. ACNS, ser. Springer
    • M. Abe, S. S. M. Chow, K. Haralambiev, and M. Ohkubo, "Double-trapdoor anonymous tags for traceable signatures," in Proc. ACNS, ser. LNCS, vol. 6715. Springer, 2011, pp. 183-200.
    • (2011) LNCS , vol.6715 , pp. 183-200
    • Abe, M.1    Chow, S.S.M.2    Haralambiev, K.3    Ohkubo, M.4
  • 17
    • 48649088209 scopus 로고    scopus 로고
    • A group signature based secure and privacy-preserving vehicular communication framework
    • IEEE CS
    • J. Guo, J. P. Baugh, and S. Wang, "A group signature based secure and privacy-preserving vehicular communication framework," in Proc. INFOCOM Workshops. IEEE CS, 2007, pp. 103-108.
    • (2007) Proc. INFOCOM Workshops , pp. 103-108
    • Guo, J.1    Baugh, J.P.2    Wang, S.3
  • 18
    • 0035035153 scopus 로고    scopus 로고
    • Mobile values, new names, and secure communication
    • ACM
    • M. Abadi and C. Fournet, "Mobile values, new names, and secure communication," in Proc. POPL. ACM, 2001, pp. 104-115.
    • (2001) Proc. POPL , pp. 104-115
    • Abadi, M.1    Fournet, C.2
  • 19
    • 68249084846 scopus 로고    scopus 로고
    • Verifying privacy-type properties of electronic voting protocols
    • S. Delaune, S. Kremer, and M. D. Ryan, "Verifying privacy-type properties of electronic voting protocols," Journal of Computer Security, vol. 17, no. 4, pp. 435-487, 2009.
    • (2009) Journal of Computer Security , vol.17 , Issue.4 , pp. 435-487
    • Delaune, S.1    Kremer, S.2    Ryan, M.D.3
  • 20
    • 0034822279 scopus 로고    scopus 로고
    • An efficient cryptographic protocol verifier based on prolog rules
    • IEEE CS
    • B. Blanchet, "An efficient cryptographic protocol verifier based on prolog rules," in Proc. CSFW. IEEE CS, 2001, pp. 82-96.
    • (2001) Proc. CSFW , pp. 82-96
    • Blanchet, B.1
  • 21
    • 0030708255 scopus 로고    scopus 로고
    • A hierarchy of authentication specification
    • IEEE CS
    • G. Lowe, "A hierarchy of authentication specification," in Proc. CSFW. IEEE CS, 1997, pp. 31-44.
    • (1997) Proc. CSFW , pp. 31-44
    • Lowe, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.