-
1
-
-
67449129150
-
Dedicated short range communications (dsrc)
-
"Dedicated short range communications (dsrc),". http://grouper.ieee.org/groups/scc32/dsrc/index.html.
-
-
-
-
2
-
-
3042594839
-
The security and privacy of smart vehicles
-
J. P. Hubaux, S. Capkun, and J. Luo, "The security and privacy of smart vehicles," IEEE Security and Privacy Magazine, vol. 2, no. 3, pp. 49-55, 2004.
-
(2004)
IEEE Security and Privacy Magazine
, vol.2
, Issue.3
, pp. 49-55
-
-
Hubaux, J.P.1
Capkun, S.2
Luo, J.3
-
3
-
-
44649130857
-
On prime-order elliptic curves with embedding degrees k = 3, 4, and 6
-
Springer-Verlag
-
K. Karabina and E. Teske, "On prime-order elliptic curves with embedding degrees k = 3, 4, and 6," in The 8th International Conference on Algorithmic Number Theory, LNCS 5011, pp. 102-117, Springer-Verlag, 2008.
-
(2008)
The 8th International Conference on Algorithmic Number Theory, LNCS 5011
, pp. 102-117
-
-
Karabina, K.1
Teske, E.2
-
4
-
-
84903880525
-
Toward a secure batch verification with group testing for vanet
-
C. C. Lee and Y. M. Lai, "Toward a secure batch verification with group testing for vanet," Wireless Networks, vol. 18, no. 2, pp. 61-70, 2012.
-
(2012)
Wireless Networks
, vol.18
, Issue.2
, pp. 61-70
-
-
Lee, C.C.1
Lai, Y.M.2
-
5
-
-
38149112088
-
New efficient proxy blind signa-ture scheme using verifiable self-certified public key
-
J. Li and S. Wang, "New efficient proxy blind signa-ture scheme using verifiable self-certified public key," International Journal of Network Security, vol. 4, no. 2, pp. 193-200, 2007.
-
(2007)
International Journal of Network Security
, vol.4
, Issue.2
, pp. 193-200
-
-
Li, J.1
Wang, S.2
-
6
-
-
36749076982
-
Gsis: A secure and privacy-preserving protocol for vehicular communications
-
X. Lin, X. Sun, P. H. Ho, and X. Shen, "Gsis: A secure and privacy-preserving protocol for vehicular communications," IEEE Transactions on Vehicular Technology, vol. 56, no. 6, pp. 3442-3456, 2007.
-
(2007)
IEEE Transactions on Vehicular Technology
, vol.56
, Issue.6
, pp. 3442-3456
-
-
Lin, X.1
Sun, X.2
Ho, P.H.3
Shen, X.4
-
7
-
-
34247368518
-
Probabilistic validation of aggregated data in vehicular ad hoc networks
-
F. Picconi and M. Gruteser, "Probabilistic validation of aggregated data in vehicular ad hoc networks," in ACM VANET 2006, pp. 76-85, 2006.
-
(2006)
ACM VANET 2006
, pp. 76-85
-
-
Picconi, F.1
Gruteser, M.2
-
8
-
-
0000901529
-
Security arguments for digital signatures and blind signatures
-
D. Pointcheval and J. Stern, "Security arguments for digital signatures and blind signatures," Journal of Cryptology, vol. 13, pp. 361-396, 2000.
-
(2000)
Journal of Cryptology
, vol.13
, pp. 361-396
-
-
Pointcheval, D.1
Stern, J.2
-
9
-
-
34247336902
-
Efficient secure aggregation in VANETs
-
M. Raya, A. Aziz, and J. P. Hubaux, "Efficient secure aggregation in VANETs," in Proceedings of International workshop on Vehicular Ad Hoc Networks, pp. 67-75, 2006.
-
(2006)
Proceedings of International workshop on Vehicular Ad Hoc Networks
, pp. 67-75
-
-
Raya, M.1
Aziz, A.2
Hubaux, J.P.3
-
10
-
-
33845726678
-
Securing vehicular ad hoc networks
-
M. Raya and J. P. Hubaux, "Securing vehicular ad hoc networks," Journal of Computer Security, vol. 15, no. 1, pp. 39-68, 2007.
-
(2007)
Journal of Computer Security
, vol.15
, Issue.1
, pp. 39-68
-
-
Raya, M.1
Hubaux, J.P.2
-
11
-
-
84858176729
-
A note on security protocol for multicast communications
-
M. Stanek, "A note on security protocol for multicast communications," International Journal of Network Security, vol. 14, no. 1, pp. 59-60, 2012.
-
(2012)
International Journal of Network Security
, vol.14
, Issue.1
, pp. 59-60
-
-
Stanek, M.1
-
12
-
-
77951572383
-
ASIC: Aggregate signatures and certificates verification scheme for vehicular networks
-
A. Wasef and X. Shen, "ASIC: Aggregate signatures and certificates verification scheme for vehicular networks," in Proceedings of GLOBECOM 09, pp. 4489-4494, 2009.
-
(2009)
Proceedings of GLOBECOM 09
, pp. 4489-4494
-
-
Wasef, A.1
Shen, X.2
-
13
-
-
71649086263
-
Proof of forward security for password-based authenticated key exchange
-
S. Wu and Y. Zhu, "Proof of forward security for password-based authenticated key exchange," Inter-national Journal of Network Security, vol. 7, no. 3, pp. 335-341, 2008.
-
(2008)
Inter-national Journal of Network Security
, vol.7
, Issue.3
, pp. 335-341
-
-
Wu, S.1
Zhu, Y.2
-
14
-
-
84875321481
-
An improvement on a three-party password-based key exchange protocol using weil pairing
-
Z. Yong, M. Jianfeng, and S. Moon, "An improvement on a three-party password-based key exchange protocol using weil pairing," International Journal of Network Security, vol. 11, no. 1, pp. 14-19, 2010.
-
(2010)
International Journal of Network Security
, vol.11
, Issue.1
, pp. 14-19
-
-
Yong, Z.1
Jianfeng, M.2
Moon, S.3
-
15
-
-
84855615935
-
On batch verification with group testing for vehicular communica-tions
-
C. Zhang, P. H. Ho, and J. Tapolcai, "On batch verification with group testing for vehicular communica-tions," Wireless Networks, vol. 17, no. 8, pp. 1851-1865, 2011.
-
(2011)
Wireless Networks
, vol.17
, Issue.8
, pp. 1851-1865
-
-
Zhang, C.1
Ho, P.H.2
Tapolcai, J.3
-
16
-
-
80054828476
-
APPA: Aggregate privacy-preserving authentication in vehicular ad hoc networks
-
Springer-Verlag
-
L. Zhang, Q. Wu, B. Qin, and J. Domingo-Ferrer, "APPA: Aggregate privacy-preserving authentication in vehicular ad hoc networks," in The 14th Information Security Conference (ISC 2011), LNCS 7001, pp. 293-308, Springer-Verlag, 2011.
-
(2011)
The 14th Information Security Conference (ISC 2011), LNCS 7001
, pp. 293-308
-
-
Zhang, L.1
Wu, Q.2
Qin, B.3
Domingo-Ferrer, J.4
-
17
-
-
80054058425
-
ID-based weak blind signature from bilinear pairings
-
Z. M. Zhao, "ID-based weak blind signature from bilinear pairings," International Journal of Network Security, vol. 7, no. 2, pp. 265-268, 2008.
-
(2008)
International Journal of Network Security
, vol.7
, Issue.2
, pp. 265-268
-
-
Zhao, Z.M.1
-
18
-
-
51249087922
-
AEMA: An aggregated emergency message authentication scheme for enhancing the security of vehicular ad hoc networks
-
H. Zhu, X. Lin, R. Lu, P. Ho, and X. Shen, "AEMA: An aggregated emergency message authentication scheme for enhancing the security of vehicular ad hoc networks," in IEEE ICC 2008, pp. 1436-1440, 2008.
-
(2008)
IEEE ICC 2008
, pp. 1436-1440
-
-
Zhu, H.1
Lin, X.2
Lu, R.3
Ho, P.4
Shen, X.5
|