-
1
-
-
79959425628
-
A comparative study of MANET and VANET environment
-
Dahiya, A., & Chauhan, R. K. (2010). A comparative study of MANET and VANET environment. Journal of Computing, 2(7), 87-92.
-
(2010)
Journal of Computing
, vol.2
, Issue.7
, pp. 87-92
-
-
Dahiya, A.1
Chauhan, R.K.2
-
2
-
-
80052938422
-
A lightweight anonymous routing protocol without public key en/decryptions for wireless ad hoc networks
-
2842889 1251.68044 10.1016/j.ins.2011.07.014
-
Li, C.-T., & Hwang, M.-S. (2011). A lightweight anonymous routing protocol without public key en/decryptions for wireless ad hoc networks. Information Sciences, 181(23), 5333-5347.
-
(2011)
Information Sciences
, vol.181
, Issue.23
, pp. 5333-5347
-
-
Li, C.-T.1
Hwang, M.-S.2
-
3
-
-
0037461435
-
Braving the broadcast storm: Infrastructural support for ad hoc routing
-
1052.68015 10.1016/S1389-1286(02)00423-1
-
Sivakumar, R., Sinha, P., & Bharghavan, V. (2003). Braving the broadcast storm: Infrastructural support for ad hoc routing. Computer Networks, 41(6), 687-706.
-
(2003)
Computer Networks
, vol.41
, Issue.6
, pp. 687-706
-
-
Sivakumar, R.1
Sinha, P.2
Bharghavan, V.3
-
4
-
-
77957259997
-
SPECS: Secure and privacy enhancing communications schemes for VANETs
-
10.1016/j.adhoc.2010.05.005
-
Chim, T. W., Yiu, S. M., Hui, L. C. K., & Li, V. O. K. (2011). SPECS: Secure and privacy enhancing communications schemes for VANETs. Ad Hoc Networks, 9(12), 189-203.
-
(2011)
Ad Hoc Networks
, vol.9
, Issue.12
, pp. 189-203
-
-
Chim, T.W.1
Yiu, S.M.2
Hui, L.C.K.3
Li, V.O.K.4
-
5
-
-
78649284515
-
Detecting misbehaviors in VANET with integrated root-cause analysis
-
10.1016/j.adhoc.2010.02.008
-
Ghosh, M., Varghese, A., Gupta, A., Kherani, A. A., & Muthaiah, S. N. (2010). Detecting misbehaviors in VANET with integrated root-cause analysis. Ad Hoc Networks, 8(7), 778-790.
-
(2010)
Ad Hoc Networks
, vol.8
, Issue.7
, pp. 778-790
-
-
Ghosh, M.1
Varghese, A.2
Gupta, A.3
Kherani, A.A.4
Muthaiah, S.N.5
-
6
-
-
84880503047
-
Vehicle ad hoc networks: Applications and related technical issues
-
10.1109/COMST.2008.4625806
-
Toor, Y., Muhlethaler, P., & Laouiti, A. (2008). Vehicle ad hoc networks: Applications and related technical issues. IEEE Communications Surveys and Tutorials, 10(3), 74-87.
-
(2008)
IEEE Communications Surveys and Tutorials
, vol.10
, Issue.3
, pp. 74-87
-
-
Toor, Y.1
Muhlethaler, P.2
Laouiti, A.3
-
7
-
-
46749112734
-
Vehicular ad hoc networks: A new challenge for localization-based systems
-
10.1016/j.comcom.2007.12.004
-
Boukerche, A., Oliveira, H. A. B. F., Nakamura, E. F., & Loureiro, A. A. F. (2008). Vehicular ad hoc networks: A new challenge for localization-based systems. Computer Communications, 31(12), 2838-2849.
-
(2008)
Computer Communications
, vol.31
, Issue.12
, pp. 2838-2849
-
-
Boukerche, A.1
Oliveira, H.2
Nakamura, E.F.3
Loureiro, A.A.F.4
-
8
-
-
84859106331
-
Hindering false event dissemination in VANETs with proof-of-work mechanisms
-
10.1016/j.trc.2011.08.002
-
Palomar, E., de Fuentes, J. M., González-Tablas, A. I., & Alcaide, A. (2012). Hindering false event dissemination in VANETs with proof-of-work mechanisms. Transportation Research Part C: Emerging Technologies, 23, 85-97.
-
(2012)
Transportation Research Part C: Emerging Technologies
, vol.23
, pp. 85-97
-
-
Palomar, E.1
De Fuentes, J.M.2
González-Tablas, A.I.3
Alcaide, A.4
-
9
-
-
33845726678
-
Securing vehicular ad hoc networks
-
Raya, M., & Hubaux, J.-P. (2007). Securing vehicular ad hoc networks. Journal of Computer Security, 15(1), 39-68.
-
(2007)
Journal of Computer Security
, vol.15
, Issue.1
, pp. 39-68
-
-
Raya, M.1
Hubaux, J.-P.2
-
10
-
-
80052850011
-
Improving RSU service time by distributed sorting mechanism
-
10.1016/j.adhoc.2010.07.008
-
Wu, T.-Y., Guizani, S., Lee, W.-T., & Liao, K.-H. (2012). Improving RSU service time by distributed sorting mechanism. Ad Hoc Networks, 10(2), 212-221.
-
(2012)
Ad Hoc Networks
, vol.10
, Issue.2
, pp. 212-221
-
-
Wu, T.-Y.1
Guizani, S.2
Lee, W.-T.3
Liao, K.-H.4
-
11
-
-
84855615935
-
On batch verification with group testing for vehicular communications
-
10.1007/s11276-011-0383-2
-
Zhang, C., Ho, P.-H., & Tapolcai, J. (2011). On batch verification with group testing for vehicular communications. Wireless Networks, 17(8), 1851-1865.
-
(2011)
Wireless Networks
, vol.17
, Issue.8
, pp. 1851-1865
-
-
Zhang, C.1
Ho, P.-H.2
Tapolcai, J.3
-
12
-
-
57049129831
-
An efficient message authentication scheme for vehicular communications
-
10.1109/TVT.2008.928581
-
Zhang, C., Lin, X., Lu, R., Ho, P.-H., & Shen, X. (2008). An efficient message authentication scheme for vehicular communications. IEEE Transactions on Vehicular Technology, 57(6), 3357-3368.
-
(2008)
IEEE Transactions on Vehicular Technology
, vol.57
, Issue.6
, pp. 3357-3368
-
-
Zhang, C.1
Lin, X.2
Lu, R.3
Ho, P.-H.4
Shen, X.5
-
13
-
-
3042594839
-
The security and privacy of smart vehicles
-
10.1109/MSP.2004.26
-
Hubaux, J.-P., Capkun, S., & Luo, J. (2004). The security and privacy of smart vehicles. IEEE Security and Privacy, 2(3), 49-55.
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.3
, pp. 49-55
-
-
Hubaux, J.-P.1
Capkun, S.2
Luo, J.3
-
14
-
-
82955235553
-
An efficient and secure mobile payment protocol for restricted connectivity scenarios in vehicular ad hoc network
-
10.1016/j.comcom.2011.09.003
-
Li, W., Wen, Q., Su, Q., & Jin, Z. (2011). An efficient and secure mobile payment protocol for restricted connectivity scenarios in vehicular ad hoc network. Computer Communications, 35(2), 188-195.
-
(2011)
Computer Communications
, vol.35
, Issue.2
, pp. 188-195
-
-
Li, W.1
Wen, Q.2
Su, Q.3
Jin, Z.4
-
15
-
-
80052737225
-
Security on vanets: Privacy, misbehaving nodes, false information and secure data aggregation
-
10.1016/j.jnca.2011.07.006
-
Antolino Rivas, D., Barceló-Ordinas, J. M., Guerrero Zapata, M., & Morillo-Pozo, J. D. (2011). Security on vanets: Privacy, misbehaving nodes, false information and secure data aggregation. Journal of Network and Computer Applications, 34(6), 1942-1955.
-
(2011)
Journal of Network and Computer Applications
, vol.34
, Issue.6
, pp. 1942-1955
-
-
Antolino Rivas, D.1
Barceló-Ordinas, J.M.2
Guerrero Zapata, M.3
Morillo-Pozo, J.D.4
-
16
-
-
0017018484
-
New directions in cryptography
-
437208 0435.94018 10.1109/TIT.1976.1055638
-
Diffie, W., & Hellman, M. (1976). New directions in cryptography. IEEE Transactions on Information Theory, 22(6), 644-654.
-
(1976)
IEEE Transactions on Information Theory
, vol.22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.2
-
17
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
700103 0368.94005 10.1145/359340.359342
-
Rivest, R. L., Shamir, A., & Adleman, L. M. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2), 120-126.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
18
-
-
36749076982
-
GSIS: A secure and privacy-preserving protocol for vehicular communications
-
10.1109/TVT.2007.906878
-
Lin, X., Sun, X., Ho, P.-H., & Shen, X. (2007). GSIS: A secure and privacy-preserving protocol for vehicular communications. IEEE Transactions on Vehicular Technology, 56(6), 3442-3456.
-
(2007)
IEEE Transactions on Vehicular Technology
, vol.56
, Issue.6
, pp. 3442-3456
-
-
Lin, X.1
Sun, X.2
Ho, P.-H.3
Shen, X.4
-
20
-
-
78751657441
-
ABAKA: An anonymous batch authenticated and key agreement scheme for value-added services in vehicular ad hoc networks
-
10.1109/TVT.2010.2089544
-
Huang, J.-L., Yeh, L.-Y., & Chien, H.-Y. (2011). ABAKA: An anonymous batch authenticated and key agreement scheme for value-added services in vehicular ad hoc networks. IEEE Transaction on Vehicular Technology, 60(1), 248-262.
-
(2011)
IEEE Transaction on Vehicular Technology
, vol.60
, Issue.1
, pp. 248-262
-
-
Huang, J.-L.1
Yeh, L.-Y.2
Chien, H.-Y.3
-
21
-
-
84863354250
-
On the security of an anonymous batch authenticated and key agreement scheme for value-added services in VANETs
-
10.1016/j.proeng.2012.01.204
-
Wang, H., & Zhang, Y. (2012). On the security of an anonymous batch authenticated and key agreement scheme for value-added services in VANETs. Procedia Engineering, 29, 1735-1739.
-
(2012)
Procedia Engineering
, vol.29
, pp. 1735-1739
-
-
Wang, H.1
Zhang, Y.2
-
22
-
-
79951969637
-
Threshold anonymous announcement in VANETs
-
10.1109/JSAC.2011.110310
-
Chen, L., Ng, S.-L., & Wang, G. (2011). Threshold anonymous announcement in VANETs. IEEE Journal on Selected Areas in Communications, 29(3), 605-615.
-
(2011)
IEEE Journal on Selected Areas in Communications
, vol.29
, Issue.3
, pp. 605-615
-
-
Chen, L.1
Ng, S.-L.2
Wang, G.3
-
24
-
-
84874324906
-
Identity-based encryption from the Weil pairing
-
1931424 10.1007/3-540-44647-8-13
-
Boneh, D., & Franklin, M. (2001). Identity-based encryption from the Weil pairing. Lecture Notes in Computer Science, 2139(13), 213-229.
-
(2001)
Lecture Notes in Computer Science
, vol.2139
, Issue.13
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
26
-
-
0035336179
-
New explicit conditions of elliptic curve traces for FR-reduction
-
Miyaji, A., Nakabayashi, M., & Takano, S. (2001). New explicit conditions of elliptic curve traces for FR-reduction. IEICE Transaction on Fundamentals of Electronics, E84-A(5), 1234-1243.
-
(2001)
IEICE Transaction on Fundamentals of Electronics
, vol.84
, Issue.5
, pp. 1234-1243
-
-
Miyaji, A.1
Nakabayashi, M.2
Takano, S.3
|