-
2
-
-
84874324906
-
Identity-based encryption from the Weil pairing
-
Proc. Crypto'01, Springer-Verlag
-
D. Boneh and M. Franklin, "Identity-based encryption from the Weil pairing," in Proc. Crypto'01, LNCS 2139, Springer-Verlag, pp. 213-229, 2001.
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
3
-
-
35248835575
-
Aggregate and verifiably encrypted signatures from bilinear maps
-
Proc. Eurocrypt'03, Springer-Verlag
-
D. Boneh, C. Gentry, B. Lynn, and H. Shacham, "Aggregate and verifiably encrypted signatures from bilinear maps," in Proc. Eurocrypt'03, LNCS 2656, Springer-Verlag, pp. 416-432, 2003.
-
(2003)
LNCS
, vol.2656
, pp. 416-432
-
-
Boneh, D.1
Gentry, C.2
Lynn, B.3
Shacham, H.4
-
4
-
-
38049146172
-
Batch verification of short signatures
-
Proc. Eurocrypt'07, Springer-Verlag
-
J. Camenisch, S. Hohenberger, and M. Pedersen, "Batch verification of short signatures," in Proc. Eurocrypt'07, LNCS 4514, Springer-Verlag, pp. 246-263, 2007.
-
(2007)
LNCS
, vol.4514
, pp. 246-263
-
-
Camenisch, J.1
Hohenberger, S.2
Pedersen, M.3
-
6
-
-
84921021973
-
Batch RSA
-
Proc. Crypto'89, Springer-Verlag
-
A. Fiat, "Batch RSA," in Proc. Crypto'89, LNCS 435, Springer-Verlag, pp. 175-185, 1989.
-
(1989)
LNCS
, vol.435
, pp. 175-185
-
-
Fiat, A.1
-
8
-
-
35248867510
-
Efficient identity based signature schemes based on pairings
-
Proc. SAC'02, Springer-Verlag
-
F. Hess, "Efficient identity based signature schemes based on pairings," in Proc. SAC'02, LNCS 2595, Springer-Verlag, pp. 310-324, 2003.
-
(2003)
LNCS
, vol.2595
, pp. 310-324
-
-
Hess, F.1
-
9
-
-
3042594839
-
The security and privacy of smart vehicles
-
J. P. Hubaux, S. Capkun, and J. Luo, "The security and privacy of smart vehicles," IEEE Security and Privacy Mag., vol. 2, no. 3, pp. 49-55, 2004.
-
(2004)
IEEE Security and Privacy Mag.
, vol.2
, Issue.3
, pp. 49-55
-
-
Hubaux, J.P.1
Capkun, S.2
Luo, J.3
-
12
-
-
67349168446
-
BAT: A robust signature scheme for vehicular networks using binary authentication tree
-
Y. Jiang, M. Shi, and X. S. Shen, "BAT: a robust signature scheme for vehicular networks using binary authentication tree," IEEE Trans. Wireless Commun., vol. 8, no. 4, pp. 1974-1983, 2009.
-
(2009)
IEEE Trans. Wireless Commun.
, vol.8
, Issue.4
, pp. 1974-1983
-
-
Jiang, Y.1
Shi, M.2
Shen, X.S.3
-
13
-
-
42649121690
-
Security in vehicular ad hoc networks
-
X. Lin, R. Lu, C. Zhang, H. Zhu, P.-H. Ho, and X. Shen, "Security in vehicular ad hoc networks," IEEE Commun. Mag., vol. 46, no. 4, pp. 88-95, 2008.
-
(2008)
IEEE Commun. Mag.
, vol.46
, Issue.4
, pp. 88-95
-
-
Lin, X.1
Lu, R.2
Zhang, C.3
Zhu, H.4
Ho, P.-H.5
Shen, X.6
-
14
-
-
36749076982
-
GSIS: A secure and privacy-preserving protocol for vehicular communications
-
DOI 10.1109/TVT.2007.906878
-
X. Lin, X. Sun, P. H. Ho, and X. Shen, "GSIS: a secure and privacypreserving protocol for vehicular communications," IEEE Trans. Veh. Technol., vol. 56, no. 6, pp. 3442-3456, 2007. (Pubitemid 350201103)
-
(2007)
IEEE Transactions on Vehicular Technology
, vol.56
, Issue.6 I
, pp. 3442-3456
-
-
Lin, X.1
Sun, X.2
Ho, P.-H.3
Shen, X.4
-
15
-
-
34247376546
-
Improved security in geographic ad hoc routing through autonomous position verification
-
T. Leinmüller, C. Maiöfer, E. Schoch, and F. Kargl, "Improved security in geographic ad hoc routing through autonomous position verification," 2006 VANET.
-
2006 VANET
-
-
Leinmüller, T.1
Maiöfer, C.2
Schoch, E.3
Kargl, F.4
-
16
-
-
44349178856
-
Vehicle-infrastructure integration (VII) and satety: Rubber and radio meets the road in california
-
J. A. Misener, "Vehicle-infrastructure integration (VII) and satety: rubber and radio meets the road in california," Intellimotion, vol. 11, no. 2, pp. 1-3, 2005.
-
(2005)
Intellimotion
, vol.11
, Issue.2
, pp. 1-3
-
-
Misener, J.A.1
-
21
-
-
84957804123
-
Identification of bad signatures in batches
-
Proc. PKC'00, Springer-Verlag
-
J. Pastuszak, D. Michatek, J. Pieprzyk, and J. Seberry, "Identification of bad signatures in batches," in Proc. PKC'00, LNCS 3958, Springer-Verlag, pp. 28-45, 2000.
-
(2000)
LNCS
, vol.3958
, pp. 28-45
-
-
Pastuszak, J.1
Michatek, D.2
Pieprzyk, J.3
Seberry, J.4
-
23
-
-
33845726678
-
Securing vehicular ad hoc networks
-
M. Raya and J. P. Hubaux, "Securing vehicular ad hoc networks," J. Computer Security, vol. 15, no. 1, pp. 39-68, 2007.
-
(2007)
J. Computer Security
, vol.15
, Issue.1
, pp. 39-68
-
-
Raya, M.1
Hubaux, J.P.2
-
24
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Proc. Crypto'84, Springer-Verlag
-
A. Shamir, "Identity-based cryptosystems and signature schemes," in Proc. Crypto'84, LNCS 196, Springer-Verlag, pp. 47-53, 1984.
-
(1984)
LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
25
-
-
77956061255
-
An ID-based aggregate signature scheme with constant pairing computations
-
K. A. Shim, "An ID-based aggregate signature scheme with constant pairing computations," J. Systems and Software, vol. 83, no. 10, pp. 1873- 1880, 2010.
-
(2010)
J. Systems and Software
, vol.83
, Issue.10
, pp. 1873-1880
-
-
Shim, K.A.1
-
26
-
-
70449565205
-
TACKing together efficient authentication, revocation, and privacy in VANETs
-
A. Studer, E. Shi, F. Bai, and A. Perrig, "TACKing together efficient authentication, revocation, and privacy in VANETs," 2009 IEEE SECON Conference.
-
2009 IEEE SECON Conference
-
-
Studer, A.1
Shi, E.2
Bai, F.3
Perrig, A.4
-
27
-
-
77955229114
-
An identity-based security system for user privacy in vehicular ad hoc networks
-
J. Sun, C. Zhang, Y. Zhang, and Y. Fang, "An identity-based security system for user privacy in vehicular ad hoc networks," IEEE Trans. Parallel Distrib. Syst., vol. 21, no. 9, pp. 1227-1239, 2010.
-
(2010)
IEEE Trans. Parallel Distrib. Syst.
, vol.21
, Issue.9
, pp. 1227-1239
-
-
Sun, J.1
Zhang, C.2
Zhang, Y.3
Fang, Y.4
-
28
-
-
33745171465
-
Finding collisions in the full SHA-1
-
Proc. Crypto'05, Springer-Verlag
-
X. Wang, Y. L. Yin, and H. Yu, "Finding collisions in the full SHA-1," in Proc. Crypto'05, LNCS 3621, Springer-Verlag, pp. 17-36, 2005.
-
(2005)
LNCS
, vol.3621
, pp. 17-36
-
-
Wang, X.1
Yin, Y.L.2
Yu, H.3
-
29
-
-
24944591357
-
How to break MD5 and other hash functions
-
Springer-Verlag
-
X. Wang and H. B. Yu, "How to break MD5 and other hash functions," in Proc. Eurocrypt'05, Springer-Verlag, pp. 19-35, 2005.
-
(2005)
Proc. Eurocrypt'05
, pp. 19-35
-
-
Wang, X.1
Yu, H.B.2
-
30
-
-
51449098979
-
An efficient identity-based batch verification scheme for vehicular sensor networks
-
C. Zhang, R. Lu, X. Lin, P. H. Ho, and X. Shen, "An efficient identity-based batch verification scheme for vehicular sensor networks," in Proc. 2008 IEEE INFOCOM, pp. 816-824.
-
Proc. 2008 IEEE INFOCOM
, pp. 816-824
-
-
Zhang, C.1
Lu, R.2
Lin, X.3
Ho, P.H.4
Shen, X.5
|