-
1
-
-
85032883059
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
Santa Barbara, CA, USA, Aug
-
T. El Gamal, "A public key cryptosystem and a signature scheme based on discrete logarithms, " in Proc. CRYPTO, Santa Barbara, CA, USA, Aug. 1985, pp. 10-18.
-
(1985)
Proc. CRYPTO
, pp. 10-18
-
-
El Gamal, T.1
-
2
-
-
0003735739
-
The elliptic curve digital signature algorithm (ECDSA)
-
Mississauga, ON, Canada, Tech. Rep Aug
-
D. Johnson and A. Menezes, "The elliptic curve digital signature algorithm (ECDSA), " Certicom, Mississauga, ON, Canada, Tech. Rep., Aug. 1999.
-
(1999)
Certicom
-
-
Johnson, D.1
Menezes, A.2
-
3
-
-
84879146717
-
-
IEEE Trial-Use Standard for Wireless Access in Vehicular Environments (WAVE)-Security Services for Applications and Management Messages, IEEE Std. 1609. 2, Jul. 2006
-
IEEE Trial-Use Standard for Wireless Access in Vehicular Environments (WAVE)-Security Services for Applications and Management Messages, IEEE Std. 1609. 2, Jul. 2006.
-
-
-
-
4
-
-
0003508562
-
-
Nat. Inst. Stand. Technol., Washington, DC, Fed. Inf. Process. Std. 1862. [Online]. Available
-
Digital Signature Standard (DSS), Nat. Inst. Stand. Technol., Washington, DC, 2000, Fed. Inf. Process. Std. 1862. [Online]. Available: http://csrc. nist. gov/publications/fips/
-
(2000)
Digital Signature Standard (DSS)
-
-
-
5
-
-
77950151506
-
An identity based encryption scheme based on quadratic residues
-
Cirencester, U. K., Dec
-
C. Cocks, "An identity based encryption scheme based on quadratic residues, " in Proc. IMA Int. Conf., Cirencester, U. K., Dec. 2001, pp. 360-363.
-
(2001)
Proc. IMA Int. Conf
, pp. 360-363
-
-
Cocks, C.1
-
6
-
-
35248867510
-
Efficient identity based signature schemes based on pairings
-
Aug. , Lecture Notes in Computer Science
-
F. Hess, "Efficient identity based signature schemes based on pairings, " in Proc. Revised Papers 9th Annu. Int. Workshop Sel. Areas Cryptograph., Aug. 2003, vol. 2595, pp. 310-324, Lecture Notes in Computer Science.
-
(2003)
Proc. Revised Papers 9th Annu. Int. Workshop Sel. Areas Cryptograph
, vol.2595
, pp. 310-324
-
-
Hess, F.1
-
10
-
-
33845564340
-
Securing vehicular communications
-
Oct
-
M. Raya, P. Papadimitratos, and J.-P. Hubaux, "Securing vehicular communications, " IEEE Wireless Commun., vol. 13, no. 5, pp. 8-15, Oct. 2006.
-
(2006)
IEEE Wireless Commun.
, vol.13
, Issue.5
, pp. 8-15
-
-
Raya, M.1
Papadimitratos, P.2
Hubaux, J.-P.3
-
11
-
-
77956735087
-
An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications
-
Sep
-
Y. Sun, R. Lu, X. Lin, X. S. Shen, and J. Su, "An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications, " IEEE Trans. Veh. Technol., vol. 59, no. 7, pp. 3589-3603, Sep. 2010.
-
(2010)
IEEE Trans. Veh. Technol.
, vol.59
, Issue.7
, pp. 3589-3603
-
-
Sun, Y.1
Lu, R.2
Lin, X.3
Shen, X.S.4
Su, J.5
-
12
-
-
51349156734
-
ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications
-
Phoenix, AZ, USA, Apr
-
R. Lu, X. Lin, H. Zhu, P.-H. Ho, and X. Shen, "ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications, " in Proc. 27th IEEE INFOCOM, Phoenix, AZ, USA, Apr. 2008, pp. 1229-1237.
-
(2008)
Proc. 27th IEEE INFOCOM
, pp. 1229-1237
-
-
Lu, R.1
Lin, X.2
Zhu, H.3
Ho, P.-H.4
Shen, X.5
-
13
-
-
36749076982
-
GSIS: A secure and privacypreserving protocol for vehicular communications
-
Nov
-
X. Lin, X. Sun, P.-H. Ho, and X. Shen, "GSIS: A secure and privacypreserving protocol for vehicular communications, " IEEE Trans. Veh. Technol., vol. 56, no. 6, pp. 3442-3456, Nov. 2007.
-
(2007)
IEEE Trans. Veh. Technol.
, vol.56
, Issue.6
, pp. 3442-3456
-
-
Lin, X.1
Sun, X.2
Ho, P.-H.3
Shen, X.4
-
14
-
-
0242426103
-
The TESLA broadcast authentication protocol
-
A. Perrig, R. Canetti, J. D. Tygar, and D. Song, "The TESLA broadcast authentication protocol, " CryptoBytes, vol. 5, no. 2, pp. 2-13, Summer 2002.
-
(2002)
CryptoBytes
, vol.5
, Issue.2 SUMMER
, pp. 2-13
-
-
Perrig, A.1
Canetti, R.2
Tygar, J.D.3
Song, D.4
-
15
-
-
0037623983
-
Identity-based encryption from the Weil pairing
-
D. Boneh and M. Franklin, "Identity-based encryption from the Weil pairing, " SIAM J. Comput., vol. 32, no. 3, pp. 586-615, 2003.
-
(2003)
SIAM J. Comput.
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
16
-
-
35048887476
-
Short group signatures
-
Santa Barbara, CA, USA, Aug. , LNCS series
-
D. Boneh, X. Boyen, and H. Shacham, "Short Group Signatures, " in Proc. 24th Annu. Int. CRYPTO, Santa Barbara, CA, USA, Aug. 2004, pp. 41-55, LNCS series.
-
(2004)
Proc. 24th Annu. Int. CRYPTO
, pp. 41-55
-
-
Boneh, D.1
Boyen, X.2
Shacham, H.3
-
17
-
-
37849048533
-
Efficient and robust pseudonymous authentication in vanet
-
Montreal, QC, Canada, Sep
-
G. Calandriello, P. Papadimitratos, J.-P. Hubaux, and A. Lioy, "Efficient and Robust Pseudonymous Authentication in VANET, " in Proc. 4th ACM Int. Workshopc VANET, Montreal, QC, Canada, Sep. 2007, pp. 19-28.
-
(2007)
Proc. 4th ACM Int. Workshopc VANET
, pp. 19-28
-
-
Calandriello, G.1
Papadimitratos, P.2
Hubaux, J.-P.3
Lioy, A.4
-
18
-
-
77955406142
-
On resource-aware message verification in vanets
-
Cape Town, South Africa, May
-
Z. Li and C. Chigan, "On Resource-Aware Message Verification in VANETs, " in Proc. IEEE Int. Conf. Commun., Cape Town, South Africa, May 2010, pp. 1-6.
-
(2010)
Proc. IEEE Int. Conf. Commun
, pp. 1-6
-
-
Li, Z.1
Chigan, C.2
-
19
-
-
67349168446
-
BAT: A robust signature scheme for vehicular networks using binary authentication tree
-
Apr
-
Y. Jiang, M. Shi, X. Shen, and C. Lin, "BAT: A robust signature scheme for vehicular networks using binary authentication tree, " IEEE Trans. Wireless Commun., vol. 8, no. 4, pp. 1974-1983, Apr. 2009.
-
(2009)
IEEE Trans. Wireless Commun.
, vol.8
, Issue.4
, pp. 1974-1983
-
-
Jiang, Y.1
Shi, M.2
Shen, X.3
Lin, C.4
-
20
-
-
51449098979
-
An efficient identitybased batch verification scheme for vehicular sensor networks
-
Phoenix, AZ, Apr
-
C. Zhang, R. Lu, X. Lin, P.-H. Ho, and X. Shen, "An efficient identitybased batch verification scheme for vehicular sensor networks, " in Proc. 27th IEEE INFOCOM, Phoenix, AZ, Apr. 2008, pp. 246-250.
-
(2008)
Proc. 27th IEEE INFOCOM
, pp. 246-250
-
-
Zhang, C.1
Lu, R.2
Lin, X.3
Ho, P.-H.4
Shen, X.5
-
21
-
-
38049081057
-
Fast batch verification of multiple signatures
-
Beijing, China, Apr
-
J. H. Cheon and J. H. Yi, "Fast batch verification of multiple signatures, " in Proc. 10th Int. Conf. Pract. Theory PKC, Beijing, China, Apr. 2007, pp. 442-457.
-
(2007)
Proc. 10th Int. Conf. Pract. Theory PKC
, pp. 442-457
-
-
Cheon, J.H.1
Yi, J.H.2
-
22
-
-
48649088209
-
A group signature based secure and privacy-preserving vehicular communication framework
-
Anchorage, AK, USA, May
-
J. Guo, J. Baugh, and S. Wang, "A group signature based secure and privacy-preserving vehicular communication framework, " in Proc. Mobile Netw. Veh. Environ., Anchorage, AK, USA, May 2007, pp. 103-108.
-
(2007)
Proc. Mobile Netw. Veh. Environ
, pp. 103-108
-
-
Guo, J.1
Baugh, J.2
Wang, S.3
-
23
-
-
77249157951
-
Balanced trustworthiness, safety, and privacy in vehicle-to-vehicle communications
-
Feb
-
Q. Wu, J. Domingo-Ferrer, and U. Gonzalez-Nicolas, "Balanced trustworthiness, safety, and privacy in vehicle-to-vehicle communications, " IEEE Trans. Veh. Technol., vol. 59, no. 2, pp. 559-573, Feb. 2010.
-
(2010)
IEEE Trans. Veh. Technol.
, vol.59
, Issue.2
, pp. 559-573
-
-
Wu, Q.1
Domingo-Ferrer, J.2
Gonzalez-Nicolas, U.3
-
24
-
-
53249117524
-
Pairings for cryptographers
-
Sep
-
S. D. Galbraith, K. G. Paterson, and N. P. Smart, "Pairings for cryptographers, " Discrete Appl. Math., vol. 156, no. 16, pp. 3113-3121, Sep. 2008.
-
(2008)
Discrete Appl. Math.
, vol.156
, Issue.16
, pp. 3113-3121
-
-
Galbraith, S.D.1
Paterson, K.G.2
Smart, N.P.3
-
25
-
-
84877664124
-
DDoS attack on WAVE-enabled VANET through synchronization
-
Dec
-
S. Biswas, J. Misic, and V. Misic, "DDoS attack on WAVE-enabled VANET through synchronization, " in Proc. IEEE GLOBECOM, Dec. 2012, pp. 1-6.
-
(2012)
Proc. IEEE GLOBECOM
, pp. 1-6
-
-
Biswas, S.1
Misic, J.2
Misic, V.3
-
26
-
-
84879168930
-
-
NIST: National Institute of Standards and Technology
-
NIST: National Institute of Standards and Technology, 2011. [Online]. Available: http://www.nist. gov/index. html
-
(2011)
-
-
-
27
-
-
80052406758
-
ID-based safety message authentication for security and trust in vehicular networks
-
Minneapolis, MN, USA, Jun
-
S. Biswas, J. Misic, and V. Misic, "ID-based safety message authentication for security and trust in vehicular networks, " in Proc. 31st ICDCSW, Minneapolis, MN, USA, Jun. 2011, pp. 323-331.
-
(2011)
Proc. 31st ICDCSW
, pp. 323-331
-
-
Biswas, S.1
Misic, J.2
Misic, V.3
-
28
-
-
33846186007
-
Scalable Bloom filters
-
Mar
-
P. S. Almeida, C. Baquero, N. Preguiça, and D. Hutchison, "Scalable Bloom filters, " Inf. Process. Lett., vol. 101, no. 6, pp. 255-261, Mar. 2007.
-
(2007)
Inf. Process. Lett.
, vol.101
, Issue.6
, pp. 255-261
-
-
Almeida, P.S.1
Baquero, C.2
Preguiça, N.3
Hutchison, D.4
-
29
-
-
34250668863
-
Approximately detecting duplicates for streaming data using stable bloom filters
-
Jun
-
F. Deng and D. Rafiei, "Approximately detecting duplicates for streaming data using stable bloom filters, " in Proc. ACM SIGMOD Int. Conf. Manage. Data, Jun. 2006, pp. 25-36.
-
(2006)
Proc. ACM SIGMOD Int. Conf. Manage. Data
, pp. 25-36
-
-
Deng, F.1
Rafiei, D.2
|