메뉴 건너뛰기




Volumn 19, Issue 6, 2013, Pages 1441-1449

Toward a secure batch verification with group testing for VANET

Author keywords

Ad Hoc; Anonymous; Batch authentication; Bilinear pairing; VANET

Indexed keywords

AD-HOC; ANONYMOUS; BATCH AUTHENTICATIONS; BILINEAR PAIRING; VANET;

EID: 84880254414     PISSN: 10220038     EISSN: None     Source Type: Journal    
DOI: 10.1007/s11276-013-0543-7     Document Type: Article
Times cited : (222)

References (26)
  • 1
    • 79959425628 scopus 로고    scopus 로고
    • A comparative study of MANET and VANET environment
    • Dahiya, A., & Chauhan, R. K. (2010). A comparative study of MANET and VANET environment. Journal of Computing, 2(7), 87-92.
    • (2010) Journal of Computing , vol.2 , Issue.7 , pp. 87-92
    • Dahiya, A.1    Chauhan, R.K.2
  • 2
    • 80052938422 scopus 로고    scopus 로고
    • A lightweight anonymous routing protocol without public key en/decryptions for wireless ad hoc networks
    • 2842889 1251.68044 10.1016/j.ins.2011.07.014
    • Li, C.-T., & Hwang, M.-S. (2011). A lightweight anonymous routing protocol without public key en/decryptions for wireless ad hoc networks. Information Sciences, 181(23), 5333-5347.
    • (2011) Information Sciences , vol.181 , Issue.23 , pp. 5333-5347
    • Li, C.-T.1    Hwang, M.-S.2
  • 3
    • 0037461435 scopus 로고    scopus 로고
    • Braving the broadcast storm: Infrastructural support for ad hoc routing
    • 1052.68015 10.1016/S1389-1286(02)00423-1
    • Sivakumar, R., Sinha, P., & Bharghavan, V. (2003). Braving the broadcast storm: Infrastructural support for ad hoc routing. Computer Networks, 41(6), 687-706.
    • (2003) Computer Networks , vol.41 , Issue.6 , pp. 687-706
    • Sivakumar, R.1    Sinha, P.2    Bharghavan, V.3
  • 4
    • 77957259997 scopus 로고    scopus 로고
    • SPECS: Secure and privacy enhancing communications schemes for VANETs
    • 10.1016/j.adhoc.2010.05.005
    • Chim, T. W., Yiu, S. M., Hui, L. C. K., & Li, V. O. K. (2011). SPECS: Secure and privacy enhancing communications schemes for VANETs. Ad Hoc Networks, 9(12), 189-203.
    • (2011) Ad Hoc Networks , vol.9 , Issue.12 , pp. 189-203
    • Chim, T.W.1    Yiu, S.M.2    Hui, L.C.K.3    Li, V.O.K.4
  • 5
    • 78649284515 scopus 로고    scopus 로고
    • Detecting misbehaviors in VANET with integrated root-cause analysis
    • 10.1016/j.adhoc.2010.02.008
    • Ghosh, M., Varghese, A., Gupta, A., Kherani, A. A., & Muthaiah, S. N. (2010). Detecting misbehaviors in VANET with integrated root-cause analysis. Ad Hoc Networks, 8(7), 778-790.
    • (2010) Ad Hoc Networks , vol.8 , Issue.7 , pp. 778-790
    • Ghosh, M.1    Varghese, A.2    Gupta, A.3    Kherani, A.A.4    Muthaiah, S.N.5
  • 6
    • 84880503047 scopus 로고    scopus 로고
    • Vehicle ad hoc networks: Applications and related technical issues
    • 10.1109/COMST.2008.4625806
    • Toor, Y., Muhlethaler, P., & Laouiti, A. (2008). Vehicle ad hoc networks: Applications and related technical issues. IEEE Communications Surveys and Tutorials, 10(3), 74-87.
    • (2008) IEEE Communications Surveys and Tutorials , vol.10 , Issue.3 , pp. 74-87
    • Toor, Y.1    Muhlethaler, P.2    Laouiti, A.3
  • 7
    • 46749112734 scopus 로고    scopus 로고
    • Vehicular ad hoc networks: A new challenge for localization-based systems
    • 10.1016/j.comcom.2007.12.004
    • Boukerche, A., Oliveira, H. A. B. F., Nakamura, E. F., & Loureiro, A. A. F. (2008). Vehicular ad hoc networks: A new challenge for localization-based systems. Computer Communications, 31(12), 2838-2849.
    • (2008) Computer Communications , vol.31 , Issue.12 , pp. 2838-2849
    • Boukerche, A.1    Oliveira, H.2    Nakamura, E.F.3    Loureiro, A.A.F.4
  • 9
    • 33845726678 scopus 로고    scopus 로고
    • Securing vehicular ad hoc networks
    • Raya, M., & Hubaux, J.-P. (2007). Securing vehicular ad hoc networks. Journal of Computer Security, 15(1), 39-68.
    • (2007) Journal of Computer Security , vol.15 , Issue.1 , pp. 39-68
    • Raya, M.1    Hubaux, J.-P.2
  • 10
    • 80052850011 scopus 로고    scopus 로고
    • Improving RSU service time by distributed sorting mechanism
    • 10.1016/j.adhoc.2010.07.008
    • Wu, T.-Y., Guizani, S., Lee, W.-T., & Liao, K.-H. (2012). Improving RSU service time by distributed sorting mechanism. Ad Hoc Networks, 10(2), 212-221.
    • (2012) Ad Hoc Networks , vol.10 , Issue.2 , pp. 212-221
    • Wu, T.-Y.1    Guizani, S.2    Lee, W.-T.3    Liao, K.-H.4
  • 11
    • 84855615935 scopus 로고    scopus 로고
    • On batch verification with group testing for vehicular communications
    • 10.1007/s11276-011-0383-2
    • Zhang, C., Ho, P.-H., & Tapolcai, J. (2011). On batch verification with group testing for vehicular communications. Wireless Networks, 17(8), 1851-1865.
    • (2011) Wireless Networks , vol.17 , Issue.8 , pp. 1851-1865
    • Zhang, C.1    Ho, P.-H.2    Tapolcai, J.3
  • 12
    • 57049129831 scopus 로고    scopus 로고
    • An efficient message authentication scheme for vehicular communications
    • 10.1109/TVT.2008.928581
    • Zhang, C., Lin, X., Lu, R., Ho, P.-H., & Shen, X. (2008). An efficient message authentication scheme for vehicular communications. IEEE Transactions on Vehicular Technology, 57(6), 3357-3368.
    • (2008) IEEE Transactions on Vehicular Technology , vol.57 , Issue.6 , pp. 3357-3368
    • Zhang, C.1    Lin, X.2    Lu, R.3    Ho, P.-H.4    Shen, X.5
  • 13
    • 3042594839 scopus 로고    scopus 로고
    • The security and privacy of smart vehicles
    • 10.1109/MSP.2004.26
    • Hubaux, J.-P., Capkun, S., & Luo, J. (2004). The security and privacy of smart vehicles. IEEE Security and Privacy, 2(3), 49-55.
    • (2004) IEEE Security and Privacy , vol.2 , Issue.3 , pp. 49-55
    • Hubaux, J.-P.1    Capkun, S.2    Luo, J.3
  • 14
    • 82955235553 scopus 로고    scopus 로고
    • An efficient and secure mobile payment protocol for restricted connectivity scenarios in vehicular ad hoc network
    • 10.1016/j.comcom.2011.09.003
    • Li, W., Wen, Q., Su, Q., & Jin, Z. (2011). An efficient and secure mobile payment protocol for restricted connectivity scenarios in vehicular ad hoc network. Computer Communications, 35(2), 188-195.
    • (2011) Computer Communications , vol.35 , Issue.2 , pp. 188-195
    • Li, W.1    Wen, Q.2    Su, Q.3    Jin, Z.4
  • 16
    • 0017018484 scopus 로고
    • New directions in cryptography
    • 437208 0435.94018 10.1109/TIT.1976.1055638
    • Diffie, W., & Hellman, M. (1976). New directions in cryptography. IEEE Transactions on Information Theory, 22(6), 644-654.
    • (1976) IEEE Transactions on Information Theory , vol.22 , Issue.6 , pp. 644-654
    • Diffie, W.1    Hellman, M.2
  • 17
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • 700103 0368.94005 10.1145/359340.359342
    • Rivest, R. L., Shamir, A., & Adleman, L. M. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2), 120-126.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 18
    • 36749076982 scopus 로고    scopus 로고
    • GSIS: A secure and privacy-preserving protocol for vehicular communications
    • 10.1109/TVT.2007.906878
    • Lin, X., Sun, X., Ho, P.-H., & Shen, X. (2007). GSIS: A secure and privacy-preserving protocol for vehicular communications. IEEE Transactions on Vehicular Technology, 56(6), 3442-3456.
    • (2007) IEEE Transactions on Vehicular Technology , vol.56 , Issue.6 , pp. 3442-3456
    • Lin, X.1    Sun, X.2    Ho, P.-H.3    Shen, X.4
  • 20
    • 78751657441 scopus 로고    scopus 로고
    • ABAKA: An anonymous batch authenticated and key agreement scheme for value-added services in vehicular ad hoc networks
    • 10.1109/TVT.2010.2089544
    • Huang, J.-L., Yeh, L.-Y., & Chien, H.-Y. (2011). ABAKA: An anonymous batch authenticated and key agreement scheme for value-added services in vehicular ad hoc networks. IEEE Transaction on Vehicular Technology, 60(1), 248-262.
    • (2011) IEEE Transaction on Vehicular Technology , vol.60 , Issue.1 , pp. 248-262
    • Huang, J.-L.1    Yeh, L.-Y.2    Chien, H.-Y.3
  • 21
    • 84863354250 scopus 로고    scopus 로고
    • On the security of an anonymous batch authenticated and key agreement scheme for value-added services in VANETs
    • 10.1016/j.proeng.2012.01.204
    • Wang, H., & Zhang, Y. (2012). On the security of an anonymous batch authenticated and key agreement scheme for value-added services in VANETs. Procedia Engineering, 29, 1735-1739.
    • (2012) Procedia Engineering , vol.29 , pp. 1735-1739
    • Wang, H.1    Zhang, Y.2
  • 24
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • 1931424 10.1007/3-540-44647-8-13
    • Boneh, D., & Franklin, M. (2001). Identity-based encryption from the Weil pairing. Lecture Notes in Computer Science, 2139(13), 213-229.
    • (2001) Lecture Notes in Computer Science , vol.2139 , Issue.13 , pp. 213-229
    • Boneh, D.1    Franklin, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.