메뉴 건너뛰기




Volumn 4, Issue 4, 2013, Pages 80-92

An improved privacy-preserving navigation protocol in VANETs

Author keywords

Privacy preservation; Secure navigation protocol; Vehicular ad hoc networks

Indexed keywords


EID: 84890949212     PISSN: 20935374     EISSN: 20935382     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (28)

References (21)
  • 1
    • 79953310708 scopus 로고    scopus 로고
    • Trajectory-based data forwarding for light-traffic vehicular ad hoc networks
    • May
    • J. Jeong, S. Guo, Y. Gu, T. He, and D. H. Du, "Trajectory-based data forwarding for light-traffic vehicular ad hoc networks, " IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 5, pp. 743-757, May 2011.
    • (2011) IEEE Transactions on Parallel and Distributed Systems , vol.22 , Issue.5 , pp. 743-757
    • Jeong, J.1    Guo, S.2    Gu, Y.3    He, T.4    Du, D.H.5
  • 2
    • 79959393009 scopus 로고    scopus 로고
    • US Federal Communication Commission, December. [Online]. Available
    • US Federal Communication Commission, "Dedicated. Short Range Communication Report and Order, " December 2003. [Online]. Available: http://fjallfoss.fcc.gov/edocs public/attachmatch/FCC-03-324A1.pdf/
    • (2003) Dedicated. Short Range Communication Report and Order
  • 5
    • 84870542725 scopus 로고    scopus 로고
    • A real-time vehicle navigation algorithm in sensor network environments
    • December
    • C. L. P. Chen, J. Zhou, and W. Zhao, "A real-time vehicle navigation algorithm in sensor network environments, " IEEE Transactions on Intelligent Transportation Systems, vol. 13, no. 4, pp. 1657-1666, December 2012.
    • (2012) IEEE Transactions on Intelligent Transportation Systems , vol.13 , Issue.4 , pp. 1657-1666
    • Chen, C.L.P.1    Zhou, J.2    Zhao, W.3
  • 6
    • 36749076982 scopus 로고    scopus 로고
    • Gsis: A secure and privacy preserving protocol for vehicular communications
    • November
    • X. Lin, X. Sun, P.-H. Ho, and X. Shen, "Gsis: A secure and privacy preserving protocol for vehicular communications, " IEEE Transactions on Vehicular Technology, vol. 56, no. 6, pp. 3442-3456, November 2007.
    • (2007) IEEE Transactions on Vehicular Technology , vol.56 , Issue.6 , pp. 3442-3456
    • Lin, X.1    Sun, X.2    Ho, P.-H.3    Shen, X.4
  • 8
    • 77953656768 scopus 로고    scopus 로고
    • An efficient anonymous authentication protocol for secure vehicular communications
    • May
    • Y. Park, C. Sur, C. D. Jung, and K.-H. Rhee, "An efficient anonymous authentication protocol for secure vehicular communications, " Journal of Information Science and Engineering, vol. 26, no. 3, pp. 785-800, May 2010.
    • (2010) Journal of Information Science and Engineering , vol.26 , Issue.3 , pp. 785-800
    • Park, Y.1    Sur, C.2    Jung, C.D.3    Rhee, K.-H.4
  • 9
    • 84866983141 scopus 로고    scopus 로고
    • Providing secure location-aware services for cooperative vehicular ad hoc networks
    • July
    • C. Sur, Y. Park, K. Sakurai, and K. H. Rhee, "Providing secure location-aware services for cooperative vehicular ad hoc networks, " Journal of Internet Technology, vol. 13, no. 4, pp. 631-644, July 2012.
    • (2012) Journal of Internet Technology , vol.13 , Issue.4 , pp. 631-644
    • Sur, C.1    Park, Y.2    Sakurai, K.3    Rhee, K.H.4
  • 10
    • 84886598854 scopus 로고    scopus 로고
    • Vspn: Vanet-based secure and privacy-preserving navigation
    • August
    • T. Chim, S. Yiu, L. C. Hui, and V. O. Li, "Vspn: Vanet-based secure and privacy-preserving navigation, " IEEE Transactions on Computers, vol. PP, no. 99, pp. 1-14, August 2012.
    • (2012) IEEE Transactions on Computers , vol.PP , Issue.99 , pp. 1-14
    • Chim, T.1    Yiu, S.2    Hui, L.C.3    Li, V.O.4
  • 11
    • 84890899782 scopus 로고    scopus 로고
    • February. [Online]. Available
    • C. Tarnovsky, "Deconstructing a Secure Processor, " February 2010. [Online]. Available: https: //www.blackhat.com/html/bh-dc-10/bh-dc-10-archives.html
    • (2010) Deconstructing a Secure Processor
    • Tarnovsky, C.1
  • 14
    • 77950875046 scopus 로고    scopus 로고
    • The perfect time: An examination of time-synchronization techniques
    • in, Washington State University, October, Spokane, USA
    • K. Behrendt and K. Fodero, "The perfect time: An examination of time-synchronization techniques, " in Proc. of the 32rd Annual Western Protective Relay Conference, Spokane, USA. Washington State University, October 2005, pp. 1-18.
    • (2005) Proc. of the 32rd Annual Western Protective Relay Conference , pp. 1-18
    • Behrendt, K.1    Fodero, K.2
  • 15
    • 84873910697 scopus 로고    scopus 로고
    • Security and efficiency in roaming services for wireless networks: Challenges, approaches, and prospects
    • February
    • D. He, C. Chen, J. Bu, S. Chan, and Y. Zhang, "Security and efficiency in roaming services for wireless networks: challenges, approaches, and prospects, " IEEE Communications Magazine, vol. 51, no. 2, pp. 142-150, February 2013.
    • (2013) IEEE Communications Magazine , vol.51 , Issue.2 , pp. 142-150
    • He, D.1    Chen, C.2    Bu, J.3    Chan, S.4    Zhang, Y.5
  • 16
    • 0344875575 scopus 로고    scopus 로고
    • Information hiding, anonymity and privacy: A modular approach
    • January
    • D. Hughes and V. Shmatikov, "Information hiding, anonymity and privacy: a modular approach, " Journal of Computer Security, vol. 12, no. 1, pp. 3-36, January 2004.
    • (2004) Journal of Computer Security , vol.12 , Issue.1 , pp. 3-36
    • Hughes, D.1    Shmatikov, V.2
  • 17
    • 78751651500 scopus 로고    scopus 로고
    • Sat: A security architecture achieving anonymity and traceability in wireless mesh networks
    • April
    • J. Sun, C. Zhang, Y. Zhang, and Y. Fang, "Sat: A security architecture achieving anonymity and traceability in wireless mesh networks, " IEEE Transactions on Dependable and Secure Computing, vol. 8, no. 2, pp. 295-307, April 2011.
    • (2011) IEEE Transactions on Dependable and Secure Computing , vol.8 , Issue.2 , pp. 295-307
    • Sun, J.1    Zhang, C.2    Zhang, Y.3    Fang, Y.4
  • 18
    • 74849096601 scopus 로고    scopus 로고
    • Privacy-preserving rental services using one-show anonymous credentials
    • December
    • Y. Yang, R. H. Deng, and F. Bao, "Privacy-preserving rental services using one-show anonymous credentials, " Security and Communication Networks, vol. 2, no. 6, pp. 531-545, December 2009.
    • (2009) Security and Communication Networks , vol.2 , Issue.6 , pp. 531-545
    • Yang, Y.1    Deng, R.H.2    Bao, F.3
  • 20
    • 33745218758 scopus 로고    scopus 로고
    • Improved proxy re-encryption schemes with applications to secure distributed storage
    • February
    • G. Ateniese, K. Fu, M. Green, and S. Hohenberger, "Improved proxy re-encryption schemes with applications to secure distributed storage, " ACM Transactions on Information and System Security, vol. 9, no. 1, pp. 1-30, February 2006.
    • (2006) ACM Transactions on Information and System Security , vol.9 , Issue.1 , pp. 1-30
    • Ateniese, G.1    Fu, K.2    Green, M.3    Hohenberger, S.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.