-
1
-
-
84871816306
-
Secure id-based linkable and revocable-iff-linked ring signature with constant-size construction
-
M.H. Au, J.K. Liu, W. Susilo, and T.H. Yuen Secure id-based linkable and revocable-iff-linked ring signature with constant-size construction Theoritical Computer Science 469 2013 1 14
-
(2013)
Theoritical Computer Science
, vol.469
, pp. 1-14
-
-
Au, M.H.1
Liu, J.K.2
Susilo, W.3
Yuen, T.H.4
-
2
-
-
34547339273
-
Multi-signatures in the plain public-Key model and a general forking lemma
-
DOI 10.1145/1180405.1180453, 1180453, CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security
-
M. Bellare, and G. Neven Multi-signatures in the plain public-key model and a general forking lemma CCS 2006 2006 ACM 390 399 (Pubitemid 47131386)
-
(2006)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 390-399
-
-
Bellare, M.1
Neven, G.2
-
3
-
-
0141793066
-
How to construct optimal one-time signatures
-
K. Bicakci, G. Tsudik, and B. Tung How to construct optimal one-time signatures Computer Networks 43 3 2003 339 349
-
(2003)
Computer Networks
, vol.43
, Issue.3
, pp. 339-349
-
-
Bicakci, K.1
Tsudik, G.2
Tung, B.3
-
5
-
-
84869491744
-
Batch verification of short signatures
-
J. Camenisch, S. Hohenberger, and M.O. Pedersen Batch verification of short signatures Journal of Cryptology 25 4 2012 723 747
-
(2012)
Journal of Cryptology
, vol.25
, Issue.4
, pp. 723-747
-
-
Camenisch, J.1
Hohenberger, S.2
-
6
-
-
84857622977
-
Conditional privacy through ring signature in vehicular ad-hoc networks
-
B.K. Chaurasia, and S. Verma Conditional privacy through ring signature in vehicular ad-hoc networks Transactions on Computational Science 13 2011 147 156
-
(2011)
Transactions on Computational Science
, vol.13
, pp. 147-156
-
-
Chaurasia, B.K.1
Verma, S.2
-
8
-
-
33947284337
-
Use of sparse and/or complex exponents in batch verification of exponentiations
-
J.H. Cheon, and D.H. Lee Use of sparse and/or complex exponents in batch verification of exponentiations IEEE Transactions on Computers 55 12 2006 1536 1542
-
(2006)
IEEE Transactions on Computers
, vol.55
, Issue.12
, pp. 1536-1542
-
-
Cheon, J.H.1
Lee, D.H.2
-
9
-
-
82455208962
-
OPQ: OT-based private querying in VANETs
-
T.W. Chim, S.-M. Yiu, L.C.K. Hui, and V.O.K. Li OPQ: OT-based private querying in VANETs IEEE Transactions on Intelligent Transportation Systems 12 4 2011 1413 1422
-
(2011)
IEEE Transactions on Intelligent Transportation Systems
, vol.12
, Issue.4
, pp. 1413-1422
-
-
Chim, T.W.1
Yiu, S.-M.2
Hui, L.C.K.3
Li, V.O.K.4
-
10
-
-
67650224819
-
Practical short signature batch verification
-
Lecture notes in computer science Springer
-
A.L. Ferrara, M. Green, S. Hohenberger, and M.O. Pedersen Practical short signature batch verification CT-RSA Lecture notes in computer science Vol. 5473 2009 Springer 309 324
-
(2009)
CT-RSA
, vol.5473 VOL.
, pp. 309-324
-
-
Ferrara, A.L.1
Green, M.2
Hohenberger, S.3
-
11
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
S. Goldwasser, S. Micali, and R.L. Rivest A digital signature scheme secure against adaptive chosen-message attacks SIAM Journal on Computing 17 2 1988 281 308
-
(1988)
SIAM Journal on Computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.L.3
-
12
-
-
84885299221
-
Privacy-preserving and accountable on-the-road prosecution of invalid vehicular mandatory authorizations
-
Elsevier
-
A. Gonzalez-Tablas, A. Alcaide, J. de Fuentes, and J. Montero Privacy-preserving and accountable on-the-road prosecution of invalid vehicular mandatory authorizations Ad hoc networks 2013 Elsevier
-
(2013)
Ad Hoc Networks
-
-
Gonzalez-Tablas, A.1
Alcaide, A.2
De Fuentes, J.3
Montero, J.4
-
13
-
-
80052372468
-
PACP: An efficient pseudonymous authentication-based conditional privacy protocol for VANETs
-
D. Huang, S. Misra, M. Verma, and G. Xue PACP: An efficient pseudonymous authentication-based conditional privacy protocol for VANETs IEEE Transactions on Intelligent Transportation Systems 12 3 2011 736 746
-
(2011)
IEEE Transactions on Intelligent Transportation Systems
, vol.12
, Issue.3
, pp. 736-746
-
-
Huang, D.1
Misra, S.2
Verma, M.3
Xue, G.4
-
14
-
-
78751657441
-
ABAKA: An anonymous batch authenticated and key agreement scheme for value-added services in vehicular ad hoc networks
-
J.-L. Huang, L.-Y. Yeh, and H.-Y. Chien ABAKA: An anonymous batch authenticated and key agreement scheme for value-added services in vehicular ad hoc networks IEEE Transactions on Vehicular Technology 60 1 2011 248 262
-
(2011)
IEEE Transactions on Vehicular Technology
, vol.60
, Issue.1
, pp. 248-262
-
-
Huang, J.-L.1
Yeh, L.-Y.2
Chien, H.-Y.3
-
16
-
-
36749076982
-
GSIS: A secure and privacy-preserving protocol for vehicular communications
-
DOI 10.1109/TVT.2007.906878
-
X. Lin, X. Sun, P.-H. Ho, and X. Shen GSIS: Secure vehicular communications with privacy preserving IEEE Transactions on Vehicular Technology 56 6 2007 3442 3456 (Pubitemid 350201103)
-
(2007)
IEEE Transactions on Vehicular Technology
, vol.56
, Issue.6
, pp. 3442-3456
-
-
Lin, X.1
Sun, X.2
Ho, P.-H.3
Shen, X.4
-
17
-
-
42649121690
-
Security in vehicular ad hoc networks
-
X. Lin, X. Sun, P.H. Ho, and X. Shen Security in vehicular ad hoc networks IEEE Communication Magazine 46 4 2008 88 95
-
(2008)
IEEE Communication Magazine
, vol.46
, Issue.4
, pp. 88-95
-
-
Lin, X.1
Sun, X.2
Ho, P.H.3
Shen, X.4
-
18
-
-
79952588525
-
One-time signatures and chameleon hash functions
-
Lecture notes in computer science Springer
-
P. Mohassel One-time signatures and chameleon hash functions Selected areas in cryptography Lecture notes in computer science Vol. 6544 2010 Springer 302 319
-
(2010)
Selected Areas in Cryptography
, vol.6544 VOL.
, pp. 302-319
-
-
Mohassel, P.1
-
19
-
-
77956061255
-
An ID-based aggregate signature scheme with constant pairing computations
-
K.-A. Shim An ID-based aggregate signature scheme with constant pairing computations Journal of Systems and Software 83 10 2010 1873 1880
-
(2010)
Journal of Systems and Software
, vol.83
, Issue.10
, pp. 1873-1880
-
-
Shim, K.-A.1
-
20
-
-
84861148363
-
CPAS: An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks
-
K.-A. Shim CPAS: An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks IEEE Transactions on Vehicular Technology 61 4 2012 1874 1883
-
(2012)
IEEE Transactions on Vehicular Technology
, vol.61
, Issue.4
, pp. 1874-1883
-
-
Shim, K.-A.1
-
21
-
-
84255201121
-
An efficient distributed key management scheme for group-signature based anonymous authentication in VANET
-
Y. Sun, Z. Feng, Q. Hu, and J. Su An efficient distributed key management scheme for group-signature based anonymous authentication in VANET Security and Communication Networks 5 1 2012 79 86
-
(2012)
Security and Communication Networks
, vol.5
, Issue.1
, pp. 79-86
-
-
Sun, Y.1
Feng, Z.2
Hu, Q.3
Su, J.4
-
22
-
-
77956735087
-
An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications
-
Y. Sun, R. Lu, X. Lin, X. Shen, and J. Su An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications IEEE Transactions on Vehicular Technology 59 7 2010 3589 3603
-
(2010)
IEEE Transactions on Vehicular Technology
, vol.59
, Issue.7
, pp. 3589-3603
-
-
Sun, Y.1
Lu, R.2
Lin, X.3
Shen, X.4
Su, J.5
-
23
-
-
77955229114
-
An identity-based security system for user privacy in vehicular ad hoc networks
-
J. Sun, C. Zhang, Y. Zhang, and Y. Fang An identity-based security system for user privacy in vehicular ad hoc networks IEEE Transactions on Parallel Distribution Systems 21 9 2010 1227 1239
-
(2010)
IEEE Transactions on Parallel Distribution Systems
, vol.21
, Issue.9
, pp. 1227-1239
-
-
Sun, J.1
Zhang, C.2
Zhang, Y.3
Fang, Y.4
-
24
-
-
84875690586
-
Efficient linkable and/or threshold ring signature without random oracles
-
T.H. Yuen, J.K. Liu, M.H. Au, W. Susilo, and J. Zhou Efficient linkable and/or threshold ring signature without random oracles Computation Journal 56 4 2013 407 421
-
(2013)
Computation Journal
, vol.56
, Issue.4
, pp. 407-421
-
-
Yuen, T.H.1
Liu, J.K.2
Au, M.H.3
Susilo, W.4
Zhou, J.5
-
25
-
-
51449098979
-
An efficient identity-based batch verification scheme for vehicular sensor networks
-
IEEE
-
C. Zhang, R. Lu, X. Lin, P.-H. Ho, and X. Shen An efficient identity-based batch verification scheme for vehicular sensor networks INFOCOM 2008 IEEE 246 250
-
(2008)
INFOCOM
, pp. 246-250
-
-
Zhang, C.1
Lu, R.2
Lin, X.3
Ho, P.-H.4
Shen, X.5
|