-
1
-
-
85088765513
-
Dedicated short range communications (DSRC) for intelligent transport system
-
R. Bera, J. Bera, S. Sil, S. Dogra, N. Sinha, and D. Mondal Dedicated short range communications (DSRC) for intelligent transport system Wireless and Optical Communications Networks, 2006 IFIP International Conference 2006 1 5
-
(2006)
Wireless and Optical Communications Networks, 2006 IFIP International Conference
, pp. 1-5
-
-
Bera, R.1
Bera, J.2
Sil, S.3
Dogra, S.4
Sinha, N.5
Mondal, D.6
-
3
-
-
78650984146
-
IEEE Trial-Use Standard for Wireless Access in Vehicular Environments - Security Services for Applications and Management Messages
-
Ieee
-
IEEE IEEE Trial-Use Standard for Wireless Access in Vehicular Environments - Security Services for Applications and Management Messages IEEE Std 1609.2-2006 2006 1 117
-
(2006)
IEEE Std 1609.2-2006
, pp. 1-117
-
-
-
4
-
-
77952713831
-
Certificate revocation list distribution in VANETs using most pieces broadcast
-
M. Nowatkowski, and H. Owen Certificate revocation list distribution in VANETs using most pieces broadcast IEEE SoutheastCon 2010 (SoutheastCon) 2010 238 241
-
(2010)
IEEE SoutheastCon 2010 (SoutheastCon)
, pp. 238-241
-
-
Nowatkowski, M.1
Owen, H.2
-
5
-
-
79951987763
-
Efficient certificate revocation list organization and distribution
-
J. Haas, Y.C. Hu, and K. Laberteaux Efficient certificate revocation list organization and distribution IEEE J. Sel. Areas Commun. 29 2011 595 604
-
(2011)
IEEE J. Sel. Areas Commun.
, vol.29
, pp. 595-604
-
-
Haas, J.1
Hu, Y.C.2
Laberteaux, K.3
-
8
-
-
70449488661
-
Certificate revocation in vehicular networks
-
M. Raya, D. Jungels, P. Papadimitratos, I. Aad, and J.-P. Hubaux Certificate revocation in vehicular networks Technical Report, EPFL 2006
-
(2006)
Technical Report, EPFL
-
-
Raya, M.1
Jungels, D.2
Papadimitratos, P.3
Aad, I.4
Hubaux, J.-P.5
-
9
-
-
57449105235
-
Secure vehicular communication systems: Design and architecture
-
P. Papadimitratos, L. Buttyan, T. Holczer, E. Schoch, J. Freudiger, M. Raya, Z. Ma, F. Kargl, A. Kung, and J.-P. Hubaux Secure vehicular communication systems: design and architecture IEEE Commun. Mag. 46 2008 100 109
-
(2008)
IEEE Commun. Mag.
, vol.46
, pp. 100-109
-
-
Papadimitratos, P.1
Buttyan, L.2
Holczer, T.3
Schoch, E.4
Freudiger, J.5
Raya, M.6
Ma, Z.7
Kargl, F.8
Kung, A.9
Hubaux, J.-P.10
-
11
-
-
70450180562
-
EDR: Efficient Decentralized Revocation Protocol for vehicular ad hoc networks
-
A. Wasef, and X. Shen EDR: Efficient Decentralized Revocation Protocol for vehicular ad hoc networks IEEE Trans. Veh. Technol. 58 2009 5214 5224
-
(2009)
IEEE Trans. Veh. Technol.
, vol.58
, pp. 5214-5224
-
-
Wasef, A.1
Shen, X.2
-
12
-
-
84883654200
-
COACH: COllaborative certificate stAtus CHecking mechanism for VANETs
-
10.1016/j.jnca.2012.02.006 (ISSN 1084-8045)
-
C. Gañán, J.L. Muñoz, O. Esparza, J. Mata-Díaz, J. Hernández-Serrano, and J. Alins COACH: COllaborative certificate stAtus CHecking mechanism for VANETs J. Netw. Comput. Appl. 36 5 2013 1337 1351 10.1016/j.jnca.2012.02.006 (ISSN 1084-8045)
-
(2013)
J. Netw. Comput. Appl.
, vol.36
, Issue.5
, pp. 1337-1351
-
-
Gañán, C.1
Muñoz, J.L.2
Esparza, O.3
Mata-Díaz, J.4
Hernández-Serrano, J.5
Alins, J.6
-
13
-
-
84887921272
-
EMAP: Expedite Message Authentication Protocol for vehicular ad hoc networks
-
A. Wasef, and X. Shen EMAP: Expedite Message Authentication Protocol for vehicular ad hoc networks IEEE Trans. Mob. Comput. 2011 1
-
(2011)
IEEE Trans. Mob. Comput.
, pp. 1
-
-
Wasef, A.1
Shen, X.2
-
15
-
-
77956735087
-
An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications
-
Y. Sun, R. Lu, X. Lin, X. Shen, and J. Su An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications IEEE Trans. Veh. Technol. 59 2010 3589 3603
-
(2010)
IEEE Trans. Veh. Technol.
, vol.59
, pp. 3589-3603
-
-
Sun, Y.1
Lu, R.2
Lin, X.3
Shen, X.4
Su, J.5
-
17
-
-
85012908743
-
One-way accumulators: A decentralized alternative to digital signatures (extended abstract)
-
Lect. Notes Comput. Sci. Springer
-
J.C. Benaloh, and M. de Mare One-way accumulators: a decentralized alternative to digital signatures (extended abstract) Advances in Cryptology - EUROCRYPT '93, Workshop on the Theory and Application of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings Lect. Notes Comput. Sci. vol. 765 1993 Springer 274 285
-
(1993)
Advances in Cryptology - EUROCRYPT '93, Workshop on the Theory and Application of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings
, vol.765 VOL.
, pp. 274-285
-
-
Benaloh, J.C.1
De Mare, M.2
-
19
-
-
36749076982
-
GSIS: A secure and privacy-preserving protocol for vehicular communications
-
X. Lin, X. Sun, P.-H. Ho, and X. Shen GSIS: a secure and privacy-preserving protocol for vehicular communications IEEE Trans. Veh. Technol. 56 2007 3442 3456
-
(2007)
IEEE Trans. Veh. Technol.
, vol.56
, pp. 3442-3456
-
-
Lin, X.1
Sun, X.2
Ho, P.-H.3
Shen, X.4
-
20
-
-
70449565205
-
TACKing together efficient authentication, revocation, and privacy in VANETs
-
A. Studer, E. Shi, F. Bai, and A. Perrig TACKing together efficient authentication, revocation, and privacy in VANETs SECON '09. 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, 2009. 2009 1 9
-
(2009)
SECon '09. 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, 2009.
, pp. 1-9
-
-
Studer, A.1
Shi, E.2
Bai, F.3
Perrig, A.4
-
21
-
-
34547505941
-
CARAVAN: Providing location privacy for VANET
-
K. Sampigethaya, L. Huang, M. Li, R. Poovendran, K. Matsuura, and K. Sezaki CARAVAN: providing location privacy for VANET Embedded Security in Cars (ESCAR) 2005
-
(2005)
Embedded Security in Cars (ESCAR)
-
-
Sampigethaya, K.1
Huang, L.2
Li, M.3
Poovendran, R.4
Matsuura, K.5
Sezaki, K.6
-
22
-
-
51349156734
-
ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications
-
IEEE
-
R. Lu, X. Lin, H. Zhu, P.-H. Ho, and X. Shen ECPP: efficient conditional privacy preservation protocol for secure vehicular communications INFOCOM 2008. The 27th Conference on Computer Communications IEEE 2008 1229 1237
-
(2008)
INFOCOM 2008. The 27th Conference on Computer Communications
, pp. 1229-1237
-
-
Lu, R.1
Lin, X.2
Zhu, H.3
Ho, P.-H.4
Shen, X.5
-
23
-
-
77249177167
-
DCS: An efficient distributed-certificate-service scheme for vehicular networks
-
A. Wasef, Y. Jiang, and X. Shen DCS: an efficient distributed- certificate-service scheme for vehicular networks IEEE Trans. Veh. Technol. 59 2010 533 549
-
(2010)
IEEE Trans. Veh. Technol.
, vol.59
, pp. 533-549
-
-
Wasef, A.1
Jiang, Y.2
Shen, X.3
-
24
-
-
0004115865
-
-
updated by RFC 6277
-
M. Myers, R. Ankney, A. Malpani, S. Galperin, and C. Adams Xrd.509 internet public key infrastructure online certificate status protocol - OCSP, RFC 2560 (Proposed Standard) http://www.ietf.org/rfc/rfc2560.txt 1999 updated by RFC 6277
-
(1999)
Xrd.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP, RFC 2560 (Proposed Standard)
-
-
Myers, M.1
Ankney, R.2
Malpani, A.3
Galperin, S.4
Adams, C.5
-
25
-
-
84969346266
-
A certified digital signature
-
Lect. Notes Comput. Sci. Springer Berlin / Heidelberg
-
R. Merkle A certified digital signature Advances in Cryptology - CRYPTO'89 Proceedings Lect. Notes Comput. Sci. vol. 435 1990 Springer Berlin / Heidelberg 218 238
-
(1990)
Advances in Cryptology - CRYPTO'89 Proceedings
, vol.435 VOL.
, pp. 218-238
-
-
Merkle, R.1
-
26
-
-
77649280675
-
Secure, pseudonymous, and auditable communication in vehicular ad hoc networks
-
P. Kamat, A. Baliga, and W. Trappe Secure, pseudonymous, and auditable communication in vehicular ad hoc networks Secur. Commun. Netw. 1 2008 233 244
-
(2008)
Secur. Commun. Netw.
, vol.1
, pp. 233-244
-
-
Kamat, P.1
Baliga, A.2
Trappe, W.3
-
27
-
-
50049120617
-
An identity-based ring signature scheme with enhanced privacy
-
C. Gamage, B. Gras, B. Crispo, and A.S. Tanenbaum An identity-based ring signature scheme with enhanced privacy Securecomm and Workshops, 2006 2006 1 5
-
(2006)
Securecomm and Workshops, 2006
, pp. 1-5
-
-
Gamage, C.1
Gras, B.2
Crispo, B.3
Tanenbaum, A.S.4
-
29
-
-
84945279475
-
An efficient dynamic and distributed cryptographic accumulator
-
Springer-Verlag London, UK
-
M.T. Goodrich, R. Tamassia, and J. Hasic An efficient dynamic and distributed cryptographic accumulator Proceedings of the 5th International Conference on Information Security, ISC '02 2002 Springer-Verlag London, UK 372 388
-
(2002)
Proceedings of the 5th International Conference on Information Security, ISC '02
, pp. 372-388
-
-
Goodrich, M.T.1
Tamassia, R.2
Hasic, J.3
-
31
-
-
38049029638
-
Universal accumulators with efficient nonmembership proofs
-
Springer-Verlag Berlin, Heidelberg
-
J. Li, N. Li, and R. Xue Universal accumulators with efficient nonmembership proofs Proceedings of the 5th International Conference on Applied Cryptography and Network Security, ACNS '07 2007 Springer-Verlag Berlin, Heidelberg 253 269
-
(2007)
Proceedings of the 5th International Conference on Applied Cryptography and Network Security, ACNS '07
, pp. 253-269
-
-
Li, J.1
Li, N.2
Xue, R.3
-
32
-
-
56649120426
-
Strong accumulators from collision-resistant hashing
-
Springer-Verlag Berlin, Heidelberg
-
P. Camacho, A. Hevia, M. Kiwi, and R. Opazo Strong accumulators from collision-resistant hashing Proceedings of the 11th International Conference on Information Security, ISC '08 2008 Springer-Verlag Berlin, Heidelberg 471 486
-
(2008)
Proceedings of the 11th International Conference on Information Security, ISC '08
, pp. 471-486
-
-
Camacho, P.1
Hevia, A.2
Kiwi, M.3
Opazo, R.4
-
33
-
-
84866485848
-
Strong accumulators from collision-resistant hashing
-
10.1007/s10207-012-0169-2
-
P. Camacho, A. Hevia, M. Kiwi, and R. Opazo Strong accumulators from collision-resistant hashing Int. J. Inf. Secur. 11 2012 349 363 10.1007/s10207-012-0169-2
-
(2012)
Int. J. Inf. Secur.
, vol.11
, pp. 349-363
-
-
Camacho, P.1
Hevia, A.2
Kiwi, M.3
Opazo, R.4
-
35
-
-
0037623983
-
Identity-based encryption from the Weil pairing
-
D. Boneh, and M. Franklin Identity-based encryption from the Weil pairing SIAM J. Comput. 32 2003 586 615
-
(2003)
SIAM J. Comput.
, vol.32
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
36
-
-
23044435711
-
Short signatures from the Weil pairing
-
D. Boneh, B. Lynn, and H. Shacham Short signatures from the Weil pairing J. Cryptol. 17 2004 297 319
-
(2004)
J. Cryptol.
, vol.17
, pp. 297-319
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
37
-
-
24144479376
-
-
A. Menezes, Lect. Notes Comput. Sci Springer Berlin / Heidelberg
-
M. Scott, and Computing the tate pairing A. Menezes, Topics in Cryptology - CT-RSA 2005 Lect. Notes Comput. Sci vol. 3376 2005 Springer Berlin / Heidelberg 293 304
-
(2005)
Topics in Cryptology - CT-RSA 2005
, vol.3376 VOL.
, pp. 293-304
-
-
Scott, M.1
The Tate Pairing, C.2
-
38
-
-
34047142151
-
Building a virtual hierarchy to simplify certification path discovery in mobile ad-hoc networks
-
C. Satizábal, J. Hernández-Serrano, J. Forné, and J. Pegueroles Building a virtual hierarchy to simplify certification path discovery in mobile ad-hoc networks Comput. Commun. 30 2007 1498 1512
-
(2007)
Comput. Commun.
, vol.30
, pp. 1498-1512
-
-
Satizábal, C.1
Hernández-Serrano, J.2
Forné, J.3
Pegueroles, J.4
-
39
-
-
77955295080
-
Efficient certification path discovery for MANET
-
G. Kambourakis, E. Konstantinou, A. Douma, M. Anagnostopoulos, and G. Fotiadis Efficient certification path discovery for MANET EURASIP J. Wirel. Commun. Netw. 20 1-20 2010 13
-
(2010)
EURASIP J. Wirel. Commun. Netw.
, vol.20
, Issue.120
, pp. 13
-
-
Kambourakis, G.1
Konstantinou, E.2
Douma, A.3
Anagnostopoulos, M.4
Fotiadis, G.5
-
40
-
-
84892439993
-
Creating virtual hierarchy in peer-to-peer PKI to simplify certificate path discovery
-
B. Muniyal, K.V. Prema, and S. Nayak Creating virtual hierarchy in peer-to-peer PKI to simplify certificate path discovery Int. J. Comput. Appl. 41 2012 09 12
-
(2012)
Int. J. Comput. Appl.
, vol.41
, pp. 09-12
-
-
Muniyal, B.1
Prema, K.V.2
Nayak, S.3
-
42
-
-
84976585166
-
Compact e-cash from bounded accumulator
-
Springer-Verlag Berlin, Heidelberg
-
M.H. Au, Q. Wu, W. Susilo, and Y. Mu Compact e-cash from bounded accumulator Proceedings of the 7th Cryptographers' track at the RSA conference on Topics in Cryptology, CT-RSA'07 2006 Springer-Verlag Berlin, Heidelberg 178 195
-
(2006)
Proceedings of the 7th Cryptographers' Track at the RSA Conference on Topics in Cryptology, CT-RSA'07
, pp. 178-195
-
-
Au, M.H.1
Wu, Q.2
Susilo, W.3
Mu, Y.4
-
44
-
-
84885074292
-
Performance analysis of accumulator-based revocation mechanisms
-
IFIP Adv. Inf. Commun. Technol. Springer-Verlag Berlin, Heidelberg
-
J. Lapon, M. Kohlweiss, B. Decker, and V. Naessens Performance analysis of accumulator-based revocation mechanisms Security and Privacy - Silver Linings in the Cloud IFIP Adv. Inf. Commun. Technol. vol. 330 2010 Springer-Verlag Berlin, Heidelberg 289 301
-
(2010)
Security and Privacy - Silver Linings in the Cloud
, vol.330 VOL.
, pp. 289-301
-
-
Lapon, J.1
Kohlweiss, M.2
Decker, B.3
Naessens, V.4
-
45
-
-
77953123409
-
Correlation-based traffic analysis attacks on anonymity networks
-
Y. Zhu, X. Fu, B. Graham, R. Bettati, and W. Zhao Correlation-based traffic analysis attacks on anonymity networks IEEE Trans. Parallel Distrib. Syst. 21 2010 954 967
-
(2010)
IEEE Trans. Parallel Distrib. Syst.
, vol.21
, pp. 954-967
-
-
Zhu, Y.1
Fu, X.2
Graham, B.3
Bettati, R.4
Zhao, W.5
-
46
-
-
50249091568
-
Analytical and empirical analysis of countermeasures to traffic analysis attacks
-
X. Fu, B. Graham, R. Bettati, W. Zhao, and D. Xuan Analytical and empirical analysis of countermeasures to traffic analysis attacks Proceedings of International Conference on Parallel Processing 2003 483 492
-
(2003)
Proceedings of International Conference on Parallel Processing
, pp. 483-492
-
-
Fu, X.1
Graham, B.2
Bettati, R.3
Zhao, W.4
Xuan, D.5
-
47
-
-
33847172327
-
Clustering by passing messages between data points
-
B.J. Frey, and D. Dueck Clustering by passing messages between data points Science 315 2007 972 976
-
(2007)
Science
, vol.315
, pp. 972-976
-
-
Frey, B.J.1
Dueck, D.2
-
50
-
-
80755169448
-
Privacy and accountability for location-based aggregate statistics
-
R.A. Popa, A.J. Blumberg, H. Balakrishnan, and F.H. Li Privacy and accountability for location-based aggregate statistics Proceedings of the 18th ACM Conference on Computer and communications Security, CCS '11 2011 653 666
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS '11
, pp. 653-666
-
-
Popa, R.A.1
Blumberg, A.J.2
Balakrishnan, H.3
Li, F.H.4
-
52
-
-
74049116479
-
A distortion-based metric for location privacy
-
R. Shokri, J. Freudiger, M. Jadliwala, and J.P. Hubaux A distortion-based metric for location privacy Proceedings of the 8th ACM Workshop on Privacy in the Electronic Society, WPES '09 2009 21 30
-
(2009)
Proceedings of the 8th ACM Workshop on Privacy in the Electronic Society, WPES '09
, pp. 21-30
-
-
Shokri, R.1
Freudiger, J.2
Jadliwala, M.3
Hubaux, J.P.4
-
54
-
-
35048887476
-
Short group signatures
-
M. Franklin, Lec. Notes Comput. Sci. Springer Berlin Heidelberg
-
D. Boneh, X. Boyen, and H. Shacham Short group signatures M. Franklin, Advances in Cryptology - CRYPTO 2004 Lec. Notes Comput. Sci. vol. 3152 2004 Springer Berlin Heidelberg 41 55
-
(2004)
Advances in Cryptology - CRYPTO 2004
, vol.3152 VOL.
, pp. 41-55
-
-
Boneh, D.1
Boyen, X.2
Shacham, H.3
-
55
-
-
84868328591
-
Impact of the revocation service in PKI prices
-
Lec. Notes Comput. Sci. Springer Berlin Heidelberg, Hong Kong
-
C. Gañán, J.L. Muñoz, O. Esparza, J. Mata-Díaz, and J. Alins Impact of the revocation service in PKI prices Information and Communications Security Lec. Notes Comput. Sci. vol. 7618 2012 Springer Berlin Heidelberg, Hong Kong 22 32
-
(2012)
Information and Communications Security
, vol.7618 VOL.
, pp. 22-32
-
-
Gañán, C.1
Muñoz, J.L.2
Esparza, O.3
Mata-Díaz, J.4
Alins, J.5
-
56
-
-
84859045535
-
On the release of CRLs in public key infrastructure
-
C. Ma, N. Hu, and Y. Li On the release of CRLs in public key infrastructure Proceedings of the 15th Conference on USENIX Security Symposium - Volume 15, Berkeley, CA, USA 2006
-
(2006)
Proceedings of the 15th Conference on USENIX Security Symposium - Volume 15, Berkeley, CA, USA
-
-
Ma, C.1
Hu, N.2
Li, Y.3
-
58
-
-
51449098979
-
An efficient identity-based batch verification scheme for vehicular sensor networks
-
IEEE
-
C. Zhang, R. Lu, X. Lin, P.-H. Ho, and X. Shen An efficient identity-based batch verification scheme for vehicular sensor networks INFOCOM 2008. The 27th Conference on Computer Communications IEEE 2008 246 250
-
(2008)
INFOCOM 2008. the 27th Conference on Computer Communications
, pp. 246-250
-
-
Zhang, C.1
Lu, R.2
Lin, X.3
Ho, P.-H.4
Shen, X.5
-
61
-
-
33749984059
-
SUMO (Simulation of Urban MObility); An open-source traffic simulation
-
D. Krajzewicz, G. Hertkorn, C. Rössel, and P. Wagner SUMO (Simulation of Urban MObility); an open-source traffic simulation 4th Middle East Symposium on Simulation and Modelling (MESM2002), MESM2002 2002 183 187
-
(2002)
4th Middle East Symposium on Simulation and Modelling (MESM2002), MESM2002
, pp. 183-187
-
-
Krajzewicz, D.1
Hertkorn, G.2
Rössel, C.3
Wagner, P.4
|