-
1
-
-
63749123999
-
Privacy and identity management for vehicular communication systems: A position paper
-
July
-
P. Papadimitratos, A. Kung, J.P. Hubaux, and F. Kargl, "Privacy and Identity Management for Vehicular Communication Systems: A Position Paper," Proc. Workshop Standards for Privacy in User-Centric Identity Management, July 2006.
-
(2006)
Proc. Workshop Standards for Privacy in User-Centric Identity Management
-
-
Papadimitratos, P.1
Kung, A.2
Hubaux, J.P.3
Kargl, F.4
-
2
-
-
80455138227
-
CARAVAN: Providing location privacy for VANET
-
Nov
-
K. Sampigethaya, L. Huang, M. Li, R. Poovendran, K. Matsuura, and K. Sezaki, "CARAVAN: Providing Location Privacy for VANET," Proc. Embedded Security in Cars (ESCAR) Conf., Nov. 2005.
-
(2005)
Proc. Embedded Security in Cars (ESCAR) Conf
-
-
Sampigethaya, K.1
Huang, L.2
Li, M.3
Poovendran, R.4
Matsuura, K.5
Sezaki, K.6
-
3
-
-
77249177167
-
DCS: An efficient distributed certificate service scheme for Vehicular Networks
-
Feb
-
A. Wasef, Y. Jiang, and X. Shen, "DCS: An Efficient Distributed Certificate Service Scheme for Vehicular Networks," IEEE Trans. Vehicular Technology, vol. 59, no. 2 pp. 533-549, Feb. 2010.
-
(2010)
IEEE Trans. Vehicular Technology
, vol.59
, Issue.2
, pp. 533-549
-
-
Wasef, A.1
Jiang, Y.2
Shen, X.3
-
4
-
-
33845726678
-
Securing vehicular ad hoc networks
-
M. Raya and J.-P. Hubaux, "Securing Vehicular Ad Hoc Networks," J. Computer Security, vol. 15, no. 1, pp. 39-68, 2007. (Pubitemid 46012642)
-
(2007)
Journal of Computer Security
, vol.15
, Issue.1
, pp. 39-68
-
-
Raya, M.1
Hubaux, J.-P.2
-
5
-
-
77956735087
-
An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications
-
Sept
-
Y. Sun, R. Lu, X. Lin, X. Shen, and J. Su, "An Efficient Pseudonymous Authentication Scheme with Strong Privacy Preservation for Vehicular Communications," IEEE Trans. Vehicular Technology, vol. 59, no. 7, pp. 3589-3603, Sept. 2010.
-
(2010)
IEEE Trans. Vehicular Technology
, vol.59
, Issue.7
, pp. 3589-3603
-
-
Sun, Y.1
Lu, R.2
Lin, X.3
Shen, X.4
Su, J.5
-
6
-
-
84856182115
-
Pseudonym changing at social spots: An effective strategy for location privacy in vanets
-
Jan
-
R. Lu, X. Lin, H. Luan, X. Liang, and X. Shen, "Pseudonym Changing at Social Spots: An Effective Strategy for Location Privacy in Vanets," IEEE Trans. Vehicular Technology, vol. 61, no. 1, pp. 86-96, Jan. 2012.
-
(2012)
IEEE Trans. Vehicular Technology
, vol.61
, Issue.1
, pp. 86-96
-
-
Lu, R.1
Lin, X.2
Luan, H.3
Liang, X.4
Shen, X.5
-
7
-
-
84870404010
-
-
US Bureau of Transit Statistics, http://en.wikipedia.org/wiki/Passenger/ vehicles/in/the/United/States, 2012.
-
(2012)
US Bureau of Transit Statistics
-
-
-
8
-
-
70350686304
-
Design and analysis of a lightweight certificate revocation mechanism for VANET
-
J.J. Haas, Y. Hu, and K.P. Laberteaux, "Design and Analysis of a Lightweight Certificate Revocation Mechanism for VANET," Proc. Sixth ACM Int'l Workshop VehiculAr InterNETworking, pp. 89-98, 2009.
-
(2009)
Proc. Sixth ACM Int'l Workshop VehiculAr InterNETworking
, pp. 89-98
-
-
Haas, J.J.1
Hu, Y.2
Laberteaux, K.P.3
-
10
-
-
84870466972
-
-
5.9 GHz DSRC
-
"5.9 GHz DSRC," http://grouper.ieee.org/groups/scc32/dsrc/ index.html, 2012.
-
(2012)
-
-
-
11
-
-
77951613883
-
MAAC: Message authentication acceleration protocol for vehicular ad hoc networks
-
A. Wasef and X. Shen, "MAAC: Message Authentication Acceleration Protocol for Vehicular Ad Hoc Networks," Proc. IEEE GlobeCom, 2009.
-
(2009)
Proc. IEEE GlobeCom
-
-
Wasef, A.1
Shen, X.2
-
12
-
-
3042594839
-
The security and privacy of smart vehicles
-
May/June
-
J.P. Hubaux, "The Security and Privacy of Smart Vehicles," IEEE Security and Privacy, vol. 2, no. 3, pp. 49-55, May/June 2004.
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.3
, pp. 49-55
-
-
Hubaux, J.P.1
-
13
-
-
70449565205
-
TACKing Together efficient authentication, revocation, and privacy in VANETs
-
A. Studer, E. Shi, F. Bai, and A. Perrig, "TACKing Together Efficient Authentication, Revocation, and Privacy in VANETs," Proc. IEEE CS Sixth Ann. Conf. Sensor, Mesh and Ad Hoc Comm. and Networks (SECON '09), pp. 1-9, 2009.
-
(2009)
Proc. IEEE CS Sixth Ann. Conf. Sensor, Mesh and Ad Hoc Comm. and Networks (SECON '09)
, pp. 1-9
-
-
Studer, A.1
Shi, E.2
Bai, F.3
Perrig, A.4
-
14
-
-
35348977820
-
Eviction of misbehaving and faulty nodes in vehicular networks
-
DOI 10.1109/JSAC.2007.071006
-
M. Raya, P. Papadimitratos, I. Aad, D. Jungels, and J.-P. Hubaux, "Eviction of Misbehaving and Faulty Nodes in Vehicular Networks," IEEE J. Selected Areas in Comm., vol. 25, no. 8, pp. 1557-1568, Oct. 2007. (Pubitemid 47599172)
-
(2007)
IEEE Journal on Selected Areas in Communications
, vol.25
, Issue.8
, pp. 1557-1568
-
-
Raya, M.1
Papadimitratos, P.2
Aad, I.3
Jungels, D.4
Hubaux, J.-P.5
-
15
-
-
59249093973
-
Certificate revocation list distribution in vehicular communication systems
-
P.P. Papadimitratos, G. Mezzour, and J. Hubaux, "Certificate Revocation List Distribution in Vehicular Communication Systems," Proc. Fifth ACM Int'l Workshop VehiculAr Inter-NETworking, pp. 86-87, 2008.
-
(2008)
Proc. Fifth ACM Int'l Workshop VehiculAr Inter-NETworking
, pp. 86-87
-
-
Papadimitratos, P.P.1
Mezzour, G.2
Hubaux, J.3
-
16
-
-
59249108565
-
Security certificate revocation list distribution for VANET
-
K.P. Laberteaux, J.J. Haas, and Y. Hu, "Security Certificate Revocation List Distribution for VANET," Proc. Fifth ACM int'l Workshop VehiculAr Inter-NETworking, pp. 88-89, 2008.
-
(2008)
Proc. Fifth ACM Int'l Workshop VehiculAr Inter-NETworking
, pp. 88-89
-
-
Laberteaux, K.P.1
Haas, J.J.2
Hu, Y.3
-
17
-
-
0038487088
-
Random key predistribution schemes for sensor networks
-
H. Chan, A. Perrig, and D. Song, "Random Key Predistribution Schemes for Sensor Networks," Proc. IEEE Symp. Security and Privacy, pp. 197-213, 2003.
-
(2003)
Proc. IEEE Symp. Security and Privacy
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
19
-
-
33750258287
-
GKMPAN: An efficient group rekeying scheme for secure multicast in ad-hoc networks
-
S. Zhu, S. Setia, S. Xu, and S. Jajodia, "GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks," J. Computer Security, vol. 14, pp. 301-325, 2006. (Pubitemid 44609973)
-
(2006)
Journal of Computer Security
, vol.14
, Issue.4
, pp. 301-325
-
-
Zhu, S.1
Setia, S.2
Xu, S.3
Jajodia, S.4
-
20
-
-
51249107509
-
PPGCV: Privacy preserving group communications protocol for vehicular ad hoc networks
-
A. Wasef and X. Shen, "PPGCV: Privacy Preserving Group Communications Protocol for Vehicular Ad Hoc Networks," Proc. IEEE Int'l Conf. Comm. (ICC '08), pp. 1458-1463, 2008.
-
(2008)
Proc. IEEE Int'l Conf. Comm. (ICC '08)
, pp. 1458-1463
-
-
Wasef, A.1
Shen, X.2
-
21
-
-
70450180562
-
EDR: Efficient decentralized revocation protocol for vehicular ad hoc networks
-
Nov
-
A. Wasef and X. Shen, "EDR: Efficient Decentralized Revocation Protocol for Vehicular Ad Hoc Networks," IEEE Trans. Vehicular Technology, vol. 58, no. 9, pp. 5214-5224, Nov. 2009.
-
(2009)
IEEE Trans. Vehicular Technology
, vol.58
, Issue.9
, pp. 5214-5224
-
-
Wasef, A.1
Shen, X.2
-
22
-
-
84874324906
-
Identity-Based Encryption from the Weil Pairing
-
Advances in Cryptology - CRYPTO 2001
-
D. Boneh and M.K. Franklin, "Identity-Based Encryption from the Weil Pairing," Proc. 21st Ann. Int'l Cryptology Conf. Advances in Cryptology, pp. 213-229, 2001. (Pubitemid 33317917)
-
(2001)
Lecture Notes in Computer Science
, Issue.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
23
-
-
23044435711
-
Short signatures from the weil pairing
-
DOI 10.1007/s00145-004-0314-9
-
D. Boneh, B. Lynn, and H. Shacham, "Short Signatures from the Weil Pairing," J. Cryptology, vol. 17, no. 4, pp. 297-319, 2004. (Pubitemid 41201461)
-
(2004)
Journal of Cryptology
, vol.17
, Issue.4
, pp. 297-319
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
24
-
-
24144479376
-
Computing the Tate pairing
-
Topics in Cryptology - CT-RSA 2005 - The Cryptographers' Track at the RSA Conference 2005
-
M. Scott, "Computing the Tate Pairing," Proc. Int'l Conf. Topics in Cryptology, pp. 293-304, 2005. (Pubitemid 41231218)
-
(2005)
Lecture Notes in Computer Science
, vol.3376
, pp. 293-304
-
-
Scott, M.1
-
25
-
-
0348003132
-
The state of elliptic curve cryptography
-
Mar
-
N. Koblitz, A. Menezes, and S. Vanstone, "The State of Elliptic Curve Cryptography," Designs, Codes and Cryptography, vol. 19, no. 2, pp. 173-193, Mar. 2000.
-
(2000)
Designs, Codes and Cryptography
, vol.19
, Issue.2
, pp. 173-193
-
-
Koblitz, N.1
Menezes, A.2
Vanstone, S.3
-
26
-
-
0019634370
-
Password authentication with insecure communication
-
L. Lamport, "Password Authentication with Insecure Communication," Comm. ACM, vol. 24, no. 11, pp. 770-772, 1981.
-
(1981)
Comm. ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
28
-
-
33746050083
-
The AES-CBC cipher algorithm and its use with IPsec
-
Sept
-
S. Frankel, R. Glenn, and S. Kelly, "The AES-CBC Cipher Algorithm and Its Use with IPsec," IETF RFC 3602, Sept. 2003.
-
(2003)
IETF RFC
, vol.3602
-
-
Frankel, S.1
Glenn, R.2
Kelly, S.3
-
29
-
-
1542265638
-
US Secure hash algorithm 1 (SHA1)
-
Sept
-
D. Eastlake and P. Jones, "US Secure Hash Algorithm 1 (SHA1)," IETF RFC 3174, Sept. 2001.
-
(2001)
IETF RFC
, vol.3174
-
-
Eastlake, D.1
Jones, P.2
-
30
-
-
84870410729
-
-
Crypto++ Library 5.5.2
-
"Crypto++ Library 5.5.2," http://www.cryptopp.com, 2012.
-
(2012)
-
-
-
31
-
-
0142002511
-
The elliptic curve digital signature algorithm (ECDSA)
-
D. Johnson, A. Menezes, and S. Vanstone, "The Elliptic Curve Digital Signature Algorithm (ECDSA)," Int'l J. Information Security, vol. 1, no. 1, pp. 36-63, 2001.
-
(2001)
Int'l J. Information Security
, vol.1
, Issue.1
, pp. 36-63
-
-
Johnson, D.1
Menezes, A.2
Vanstone, S.3
-
32
-
-
51449098979
-
An efficient identity-based batch verification scheme for vehicular sensor networks
-
C. Zhang, R. Lu, X. Lin, P.-H. Ho, and X. Shen, "An Efficient Identity-Based Batch Verification Scheme for Vehicular Sensor Networks," Proc. IEEE INFOCOM, pp. 246-250, 2008.
-
(2008)
Proc. IEEE INFOCOM
, pp. 246-250
-
-
Zhang, C.1
Lu, R.2
Lin, X.3
Ho, P.-H.4
Shen, X.5
-
33
-
-
84870399822
-
-
The Network Simulator-ns-2
-
"The Network Simulator-ns-2," http://nsnam.isi.edu/nsnam/index. php/User Information, 2012.
-
(2012)
-
-
|