메뉴 건너뛰기




Volumn 16, Issue 5, 2014, Pages 355-362

On the security of a secure batch verification with group testing for VANET

Author keywords

Authentication protocol; Non repudiation; Replay attacking; Security analysis; Verifying delay

Indexed keywords

AUTHENTICATION; PUBLIC KEY CRYPTOGRAPHY; STREET TRAFFIC CONTROL; TRAFFIC CONGESTION;

EID: 84903902022     PISSN: 1816353X     EISSN: 18163548     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (142)

References (18)
  • 1
    • 67449129150 scopus 로고    scopus 로고
    • Dedicated short range communications (dsrc)
    • "Dedicated short range communications (dsrc),". http://grouper.ieee.org/groups/scc32/dsrc/index.html.
  • 4
    • 84903880525 scopus 로고    scopus 로고
    • Toward a secure batch verification with group testing for vanet
    • C. C. Lee and Y. M. Lai, "Toward a secure batch verification with group testing for vanet," Wireless Networks, vol. 18, no. 2, pp. 61-70, 2012.
    • (2012) Wireless Networks , vol.18 , Issue.2 , pp. 61-70
    • Lee, C.C.1    Lai, Y.M.2
  • 5
    • 38149112088 scopus 로고    scopus 로고
    • New efficient proxy blind signa-ture scheme using verifiable self-certified public key
    • J. Li and S. Wang, "New efficient proxy blind signa-ture scheme using verifiable self-certified public key," International Journal of Network Security, vol. 4, no. 2, pp. 193-200, 2007.
    • (2007) International Journal of Network Security , vol.4 , Issue.2 , pp. 193-200
    • Li, J.1    Wang, S.2
  • 6
    • 36749076982 scopus 로고    scopus 로고
    • Gsis: A secure and privacy-preserving protocol for vehicular communications
    • X. Lin, X. Sun, P. H. Ho, and X. Shen, "Gsis: A secure and privacy-preserving protocol for vehicular communications," IEEE Transactions on Vehicular Technology, vol. 56, no. 6, pp. 3442-3456, 2007.
    • (2007) IEEE Transactions on Vehicular Technology , vol.56 , Issue.6 , pp. 3442-3456
    • Lin, X.1    Sun, X.2    Ho, P.H.3    Shen, X.4
  • 7
    • 34247368518 scopus 로고    scopus 로고
    • Probabilistic validation of aggregated data in vehicular ad hoc networks
    • F. Picconi and M. Gruteser, "Probabilistic validation of aggregated data in vehicular ad hoc networks," in ACM VANET 2006, pp. 76-85, 2006.
    • (2006) ACM VANET 2006 , pp. 76-85
    • Picconi, F.1    Gruteser, M.2
  • 8
    • 0000901529 scopus 로고    scopus 로고
    • Security arguments for digital signatures and blind signatures
    • D. Pointcheval and J. Stern, "Security arguments for digital signatures and blind signatures," Journal of Cryptology, vol. 13, pp. 361-396, 2000.
    • (2000) Journal of Cryptology , vol.13 , pp. 361-396
    • Pointcheval, D.1    Stern, J.2
  • 10
    • 33845726678 scopus 로고    scopus 로고
    • Securing vehicular ad hoc networks
    • M. Raya and J. P. Hubaux, "Securing vehicular ad hoc networks," Journal of Computer Security, vol. 15, no. 1, pp. 39-68, 2007.
    • (2007) Journal of Computer Security , vol.15 , Issue.1 , pp. 39-68
    • Raya, M.1    Hubaux, J.P.2
  • 11
    • 84858176729 scopus 로고    scopus 로고
    • A note on security protocol for multicast communications
    • M. Stanek, "A note on security protocol for multicast communications," International Journal of Network Security, vol. 14, no. 1, pp. 59-60, 2012.
    • (2012) International Journal of Network Security , vol.14 , Issue.1 , pp. 59-60
    • Stanek, M.1
  • 12
    • 77951572383 scopus 로고    scopus 로고
    • ASIC: Aggregate signatures and certificates verification scheme for vehicular networks
    • A. Wasef and X. Shen, "ASIC: Aggregate signatures and certificates verification scheme for vehicular networks," in Proceedings of GLOBECOM 09, pp. 4489-4494, 2009.
    • (2009) Proceedings of GLOBECOM 09 , pp. 4489-4494
    • Wasef, A.1    Shen, X.2
  • 13
    • 71649086263 scopus 로고    scopus 로고
    • Proof of forward security for password-based authenticated key exchange
    • S. Wu and Y. Zhu, "Proof of forward security for password-based authenticated key exchange," Inter-national Journal of Network Security, vol. 7, no. 3, pp. 335-341, 2008.
    • (2008) Inter-national Journal of Network Security , vol.7 , Issue.3 , pp. 335-341
    • Wu, S.1    Zhu, Y.2
  • 14
    • 84875321481 scopus 로고    scopus 로고
    • An improvement on a three-party password-based key exchange protocol using weil pairing
    • Z. Yong, M. Jianfeng, and S. Moon, "An improvement on a three-party password-based key exchange protocol using weil pairing," International Journal of Network Security, vol. 11, no. 1, pp. 14-19, 2010.
    • (2010) International Journal of Network Security , vol.11 , Issue.1 , pp. 14-19
    • Yong, Z.1    Jianfeng, M.2    Moon, S.3
  • 15
    • 84855615935 scopus 로고    scopus 로고
    • On batch verification with group testing for vehicular communica-tions
    • C. Zhang, P. H. Ho, and J. Tapolcai, "On batch verification with group testing for vehicular communica-tions," Wireless Networks, vol. 17, no. 8, pp. 1851-1865, 2011.
    • (2011) Wireless Networks , vol.17 , Issue.8 , pp. 1851-1865
    • Zhang, C.1    Ho, P.H.2    Tapolcai, J.3
  • 17
    • 80054058425 scopus 로고    scopus 로고
    • ID-based weak blind signature from bilinear pairings
    • Z. M. Zhao, "ID-based weak blind signature from bilinear pairings," International Journal of Network Security, vol. 7, no. 2, pp. 265-268, 2008.
    • (2008) International Journal of Network Security , vol.7 , Issue.2 , pp. 265-268
    • Zhao, Z.M.1
  • 18
    • 51249087922 scopus 로고    scopus 로고
    • AEMA: An aggregated emergency message authentication scheme for enhancing the security of vehicular ad hoc networks
    • H. Zhu, X. Lin, R. Lu, P. Ho, and X. Shen, "AEMA: An aggregated emergency message authentication scheme for enhancing the security of vehicular ad hoc networks," in IEEE ICC 2008, pp. 1436-1440, 2008.
    • (2008) IEEE ICC 2008 , pp. 1436-1440
    • Zhu, H.1    Lin, X.2    Lu, R.3    Ho, P.4    Shen, X.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.