-
1
-
-
51449098979
-
An efficient identity-based batch verification scheme for vehicular sensor networks
-
Phoenix, AZ, USA, Apr.
-
C. Zhang, R. Lu, X. Lin, P.-H. Ho, and X. Shen, "An efficient identity-based batch verification scheme for vehicular sensor networks, " in Proc. IEEE INFOCOM, Phoenix, AZ, USA, Apr. 2008, pp. 246-250.
-
(2008)
Proc. IEEE INFOCOM
, pp. 246-250
-
-
Zhang, C.1
Lu, R.2
Lin, X.3
Ho, P.-H.4
Shen, X.5
-
2
-
-
77956735087
-
An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications
-
Sep.
-
Y. Sun, R. Lu, X. Lin, X. Shen, and J. Su, "An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications, " IEEE Trans. Veh. Technol., vol. 59, no. 7, pp. 3589-3603, Sep. 2010.
-
(2010)
IEEE Trans. Veh. Technol.
, vol.59
, Issue.7
, pp. 3589-3603
-
-
Sun, Y.1
Lu, R.2
Lin, X.3
Shen, X.4
Su, J.5
-
4
-
-
48649088209
-
A group signature based secure and privacy-preserving vehicular communication framework
-
Anchorage, AK, USA May
-
J. Guo, J. P. Baugh, and S. Wang, "A group signature based secure and privacy-preserving vehicular communication framework, " in Proc. Mobile Netw. Veh. Environ., Anchorage, AK, USA, May 2007, pp. 103-108.
-
(2007)
Proc. Mobile Netw. Veh. Environ
, pp. 103-108
-
-
Guo, J.1
Baugh, J.P.2
Wang, S.3
-
5
-
-
36749076982
-
GSIS: A secure and privacy-preserving protocol for vehicular communications
-
DOI 10.1109/TVT.2007.906878
-
X. Lin, X. Sun, P.-H. Ho, and X. Shen, "GSIS: A secure and privacy-preserving protocol for vehicular communications, " IEEE Trans. Veh. Technol., vol. 56, no. 6, pp. 3442-3456, Nov. 2007. (Pubitemid 350201103)
-
(2007)
IEEE Transactions on Vehicular Technology
, vol.56
, pp. 3442-3456
-
-
Lin, X.1
Sun, X.2
Ho, P.-H.3
Shen, X.4
-
6
-
-
77955353204
-
Efficient group signature scheme supporting batch verification for securing vehicular networks
-
Cape Town, South Africa, May
-
A. Wasef and X. Shen, "Efficient group signature scheme supporting batch verification for securing vehicular networks, " in Proc. IEEE ICC, Cape Town, South Africa, May 2010, pp. 1-5.
-
(2010)
Proc. IEEE ICC
, pp. 1-5
-
-
Wasef, A.1
Shen, X.2
-
7
-
-
77952252546
-
A scalable robust authentication protocol for secure vehicular communications
-
May
-
L. Zhang, Q. Wu, A. Solanas, and J. Domingo-Ferrer, "A scalable robust authentication protocol for secure vehicular communications, " IEEE Trans. Veh. Technol., vol. 59, no. 4, pp. 1606-1617, May 2010.
-
(2010)
IEEE Trans. Veh. Technol.
, vol.59
, Issue.4
, pp. 1606-1617
-
-
Zhang, L.1
Wu, Q.2
Solanas, A.3
Domingo-Ferrer, J.4
-
8
-
-
57049129831
-
An efficient message authentication scheme for vehicular communications
-
Nov.
-
C. Zhang, X. Lin, R. Lu, P.-H. Ho, and X. Shen, "An efficient message authentication scheme for vehicular communications, " IEEE Trans. Veh. Technol., vol. 57, no. 6, pp. 3357-3368, Nov. 2008.
-
(2008)
IEEE Trans. Veh. Technol.
, vol.57
, Issue.6
, pp. 3357-3368
-
-
Zhang, C.1
Lin, X.2
Lu, R.3
Ho, P.-H.4
Shen, X.5
-
9
-
-
37849009419
-
Secure incentives for commercial ad dissemination in vehicular networks
-
Montreal, QC, Canada, Sep.
-
S.-B. Lee, G. Pan, J.-S. Park, M. Gerla, and S. Lu, "Secure incentives for commercial ad dissemination in vehicular networks, " in Proc. 8th ACM Int. Symp. MobiHoc, Montreal, QC, Canada, Sep. 2007, pp. 150-159.
-
(2007)
Proc. 8th ACM Int. Symp. MobiHoc
, pp. 150-159
-
-
Lee, S.-B.1
Pan, G.2
Park, J.-S.3
Gerla, M.4
Lu, S.5
-
10
-
-
33845726678
-
Securing vehicular ad hoc networks
-
M. Raya and J.-P. Hubaux, "Securing vehicular ad hoc networks, " J. Comput. Security, vol. 15, no. 1, pp. 39-68, Jan. 2007. (Pubitemid 46012642)
-
(2007)
Journal of Computer Security
, vol.15
, Issue.1
, pp. 39-68
-
-
Raya, M.1
Hubaux, J.-P.2
-
11
-
-
84873898187
-
A framework for secure and efficient data acquisition in vehicular ad hoc networks
-
Feb.
-
K. Mershad and H. Artail, "A framework for secure and efficient data acquisition in vehicular ad hoc networks, " IEEE Trans. Veh. Technol., vol. 62, no. 2, pp. 536-551, Feb. 2013.
-
(2013)
IEEE Trans. Veh. Technol.
, vol.62
, Issue.2
, pp. 536-551
-
-
Mershad, K.1
Artail, H.2
-
12
-
-
84870429369
-
EMAP: Expedite message authentication protocol for vehicular ad hoc networks
-
Jan.
-
A. Wasef and X. Shen, "EMAP: Expedite message authentication protocol for vehicular ad hoc networks, " IEEE Trans. Mobile Comput., vol. 12, no. 1, pp. 78-89, Jan. 2013.
-
(2013)
IEEE Trans. Mobile Comput.
, vol.12
, Issue.1
, pp. 78-89
-
-
Wasef, A.1
Shen, X.2
-
13
-
-
84881591357
-
A conditional privacy scheme based on anonymized batch authentication in vehicular ad hoc networks
-
Shanghai, China, Apr.
-
S. Jiang, X. Zhu, and L. Wang, "A conditional privacy scheme based on anonymized batch authentication in vehicular ad hoc networks, " in Proc. IEEE WCNC, Shanghai, China, Apr. 2013, pp. 2375-2380.
-
(2013)
Proc. IEEE WCNC
, pp. 2375-2380
-
-
Jiang, S.1
Zhu, X.2
Wang, L.3
-
14
-
-
79951975426
-
A distributed key management framework with cooperative message authentication in VANETs
-
Mar.
-
Y. Hao, Y. Chen, C. Zhou, and S. Wei, "A distributed key management framework with cooperative message authentication in VANETs, " IEEE J. Sel. Areas Commun., vol. 29, no. 3, pp. 616-629, Mar. 2011.
-
(2011)
IEEE J. Sel. Areas Commun.
, vol.29
, Issue.3
, pp. 616-629
-
-
Hao, Y.1
Chen, Y.2
Zhou, C.3
Wei, S.4
-
15
-
-
77950023367
-
Computationally secure self-healing key distribution with revocation in wireless ad hoc networks
-
Aug.
-
R. Dutta, S. Mukhopadhyay, and M. Collier, "Computationally secure self-healing key distribution with revocation in wireless ad hoc networks, " Ad Hoc Netw., vol. 8, no. 6, pp. 597-613, Aug. 2010.
-
(2010)
Ad Hoc Netw.
, vol.8
, Issue.6
, pp. 597-613
-
-
Dutta, R.1
Mukhopadhyay, S.2
Collier, M.3
-
16
-
-
35349016950
-
AMOEBA: Robust location privacy scheme for VANET
-
DOI 10.1109/JSAC.2007.071007
-
K. Sampigethaya, M. Li, L. Huang, and R. Poovendran, "AMOEBA: Robust location privacy scheme for VANET, " IEEE J. Sel. Areas Commun., vol. 25, no. 8, pp. 1569-1589, Oct. 2007. (Pubitemid 47599173)
-
(2007)
IEEE Journal on Selected Areas in Communications
, vol.25
, Issue.8
, pp. 1569-1589
-
-
Sampigethaya, K.1
Li, M.2
Huang, L.3
Poovendran, R.4
-
17
-
-
67249115377
-
Distributed key management with protection against RSU compromise in group signature based VANETs
-
New Orleans, LA, USA, Dec.
-
Y. Hao, Y. Cheng, and K. Ren, "Distributed key management with protection against RSU compromise in group signature based VANETs, " in Proc. IEEE GLOBECOM, New Orleans, LA, USA, Dec. 2008, pp. 1-5.
-
(2008)
Proc. IEEE GLOBECOM
, pp. 1-5
-
-
Hao, Y.1
Cheng, Y.2
Ren, K.3
-
19
-
-
0003196107
-
HMAC: Keyed-hashing for message authentication
-
Feb.
-
H. Krawczyk, R. Canetti, and M. Bellare, "HMAC: Keyed-hashing for message authentication, " RFC 2104, Feb. 1997.
-
(1997)
RFC
, vol.2104
-
-
Krawczyk, H.1
Canetti, R.2
Bellare, M.3
-
20
-
-
84874324906
-
Identity-Based Encryption from the Weil Pairing
-
Advances in Cryptology - CRYPTO 2001
-
D. Boneh and M. Franklin, "Identity-based encryption from the Weil pairing, " in Proc. Adv. Cryptol.-CRYPTO, vol. 2139, Lecture Notes in Computer Science, 2001, no. 2001, pp. 213-229. (Pubitemid 33317917)
-
(2001)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
21
-
-
12344258539
-
Efficient signature generation by smart cards
-
C. P. Schnorr, "Efficient signature generation by smart cards, " J. Cryptol., vol. 4, no. 3, pp. 161-174, 1991.
-
(1991)
J. Cryptol.
, vol.4
, Issue.3
, pp. 161-174
-
-
Schnorr, C.P.1
-
22
-
-
67650224819
-
Practical short signature batch verification
-
Proc. Top. Cryptol.-CT-RSA
-
A. L. Ferrara, M. Green, S. Hohenberger, and M. Pedersen, "Practical short signature batch verification, " in Proc. Top. Cryptol.-CT-RSA, vol. 5473, Lecture Notes in Computer Science, 2009, no. 2009, pp. 309-324.
-
(2009)
Lecture Notes in Computer Science
, vol.5473
, Issue.2009
, pp. 309-324
-
-
Ferrara, A.L.1
Green, M.2
Hohenberger, S.3
Pedersen, M.4
-
23
-
-
33746050083
-
The AES-CBC cipher algorithm and its use with IPsec
-
Sep.
-
S. Frankel, R. Glenn, and S. Kelly, The AES-CBC cipher algorithm and its use with IPsec, RFC 3602, Sep. 2003.
-
(2003)
RFC 3602
-
-
Frankel, S.1
Glenn, R.2
Kelly, S.3
-
24
-
-
1542265638
-
US secure hash algorithm 1 (SHA1)
-
Sep.
-
D. Eastlake and P. Jones, US secure hash algorithm 1 (SHA1), RFC 3174, Sep. 2001.
-
(2001)
RFC
, vol.3174
-
-
Eastlake, D.1
Jones, P.2
-
25
-
-
84936981012
-
Privacy-preserving authentication based on group signature for VANETs
-
Atlanta, GA, USA, Dec. Paper WN-23
-
X. Zhu, S. Jiang, L. Wang, H. Li, W. Zhang, and Z. Li, "Privacy-preserving authentication based on group signature for VANETs, " presented at the IEEE Global Telecommunications Conf., Atlanta, GA, USA, Dec. 2013, Paper WN-23.
-
(2013)
IEEE Global Telecommunications Conf
-
-
Zhu, X.1
Jiang, S.2
Wang, L.3
Li, H.4
Zhang, W.5
Li, Z.6
-
26
-
-
84861148363
-
An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks
-
May
-
K. A. Shim, "An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks, " IEEE Trans. Veh. Technol., vol. 61, no. 4, pp. 1874-1883, May 2012.
-
(2012)
IEEE Trans. Veh. Technol.
, vol.61
, Issue.4
, pp. 1874-1883
-
-
Shim, K.A.1
-
27
-
-
78751657441
-
AKABA: An anonymous batch authenticated and key agreement scheme for value-added services in vehicular ad hoc networks
-
Jan.
-
J. L. Huang, L. Y. Yeh, and H. Y. Chien, "AKABA: An anonymous batch authenticated and key agreement scheme for value-added services in vehicular ad hoc networks, " IEEE Trans. Veh. Technol., vol. 60, no. 1, pp. 248-262, Jan. 2011.
-
(2011)
IEEE Trans. Veh. Technol.
, vol.60
, Issue.1
, pp. 248-262
-
-
Huang, J.L.1
Yeh, L.Y.2
Chien, H.Y.3
|