메뉴 건너뛰기




Volumn 18, Issue 11, 2014, Pages 1931-1934

An improved cross-layer privacy-preserving authentication in WAVE-Enabled VANETs

Author keywords

[No Author keywords available]

Indexed keywords

AD HOC NETWORKS; AUTHENTICATION; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; VEHICLES; VEHICULAR AD HOC NETWORKS;

EID: 84910152067     PISSN: 10897798     EISSN: None     Source Type: Journal    
DOI: 10.1109/LCOMM.2014.2323291     Document Type: Article
Times cited : (17)

References (15)
  • 2
    • 80052847304 scopus 로고    scopus 로고
    • Trustworthy broadcasting in IEEE 802.11 p/WAVE vehicular networks: Delay analysis
    • Sep
    • A. Vinel, C. Campolo, J. Petit, and Y. Koucheryavy, "Trustworthy broadcasting in IEEE 802.11 p/WAVE vehicular networks: Delay analysis," IEEE Commun. Lett., vol. 15, no. 9, pp. 1010-1012, Sep. 2011.
    • (2011) IEEE Commun. Lett. , vol.15 , Issue.9 , pp. 1010-1012
    • Vinel, A.1    Campolo, C.2    Petit, J.3    Koucheryavy, Y.4
  • 3
    • 24944445896 scopus 로고    scopus 로고
    • Batch verification with ID-based signatures
    • H. J. Yoon, J. H. Cheon, and Y. Kim, "Batch verification with ID-based signatures," in Proc. ICISC LNCS, 2005, vol. 3506, pp. 233-248.
    • (2005) Proc. ICISC LNCS , vol.3506 , pp. 233-248
    • Yoon, H.J.1    Cheon, J.H.2    Kim, Y.3
  • 4
    • 84864125413 scopus 로고    scopus 로고
    • Secure delegation-based authentication protocol for wireless roaming service
    • Jul
    • J. L. Tsai, N. W. Lo, and T. C. Wu, "Secure delegation-based authentication protocol for wireless roaming service," IEEE Commun. Lett., vol. 16, no. 7, pp. 1100-1102, Jul. 2012.
    • (2012) IEEE Commun. Lett. , vol.16 , Issue.7 , pp. 1100-1102
    • Tsai, J.L.1    Lo, N.W.2    Wu, T.C.3
  • 5
    • 84886653936 scopus 로고    scopus 로고
    • Novel anonymous authentication scheme using smart cards
    • Nov
    • J. L. Tsai, N. W. Lo, and T. C. Wu, "Novel anonymous authentication scheme using smart cards," IEEE Trans. Ind. Informat., vol. 9, no. 4, pp. 2004-2013, Nov. 2013.
    • (2013) IEEE Trans. Ind. Informat. , vol.9 , Issue.4 , pp. 2004-2013
    • Tsai, J.L.1    Lo, N.W.2    Wu, T.C.3
  • 6
    • 51449098979 scopus 로고    scopus 로고
    • An efficient identity based batch verification scheme for vehicular sensor networks
    • C. Zhang, R. Lu, X. Lin, P. H. Ho, and X. Shen, "An efficient identity based batch verification scheme for vehicular sensor networks," in Proc. IEEE INFOCOM, 2008, pp. 246-250.
    • (2008) Proc. IEEE INFOCOM , pp. 246-250
    • Zhang, C.1    Lu, R.2    Lin, X.3    Ho, P.H.4    Shen, X.5
  • 7
    • 67349168446 scopus 로고    scopus 로고
    • BAT: A robust signature scheme for vehicular networks using binary authentication tree
    • Apr
    • Y. Jiang, M. Shi, and X. S. Shen, "BAT: A robust signature scheme for vehicular networks using binary authentication tree," IEEE Trans. Wireless Commun., vol. 8, no. 4, pp. 1974-1983, Apr. 2009.
    • (2009) IEEE Trans. Wireless Commun. , vol.8 , Issue.4 , pp. 1974-1983
    • Jiang, Y.1    Shi, M.2    Shen, X.S.3
  • 8
    • 77956061255 scopus 로고    scopus 로고
    • An ID-based aggregate signature scheme with constant pairing computations
    • Oct
    • K. A. Shim, "An ID-based aggregate signature scheme with constant pairing computations," J. Syst. Softw., vol. 83, no. 10, pp. 1873-1880, Oct. 2010.
    • (2010) J. Syst. Softw. , vol.83 , Issue.10 , pp. 1873-1880
    • Shim, K.A.1
  • 9
    • 84861148363 scopus 로고    scopus 로고
    • CPAS: An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks
    • K. A. Shim, "CPAS: An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks," IEEE Trans. Veh. Technol., vol. 61, no. 4, pp. 1874-1883, May 2012.
    • (2012) IEEE Trans. Veh. Technol. , vol.61 , Issue.4 , pp. 1874-1883
    • Shim, K.A.1
  • 10
    • 84873964062 scopus 로고    scopus 로고
    • On the potential of PUF for pseudonym generation in vehicular networks
    • J. Petit, C. Bosch, M. Feiri, and F. Kargl, "On the potential of PUF for pseudonym generation in vehicular networks," in Proc. IEEE VNC, 2012, pp. 94-100.
    • (2012) Proc. IEEE VNC , pp. 94-100
    • Petit, J.1    Bosch, C.2    Feiri, M.3    Kargl, F.4
  • 11
    • 84895068441 scopus 로고    scopus 로고
    • Reconstruction of a secure authentication scheme for vehicular ad hoc networks using a binary authentication tree
    • Nov
    • K. A. Shim, "Reconstruction of a secure authentication scheme for vehicular ad hoc networks using a binary authentication tree," IEEE Trans. Wireless Commun., vol. 12, no. 11, pp. 5386-5393, Nov. 2013.
    • (2013) IEEE Trans. Wireless Commun. , vol.12 , Issue.11 , pp. 5386-5393
    • Shim, K.A.1
  • 12
    • 84879136091 scopus 로고    scopus 로고
    • A cross-layer approach to privacy-preserving authentication in WAVE-enabled VANETs
    • Jun
    • S. Biswas and J. Misic, "A cross-layer approach to privacy-preserving authentication in WAVE-enabled VANETs," IEEE Trans. Veh. Technol., vol. 62, no. 5, pp. 2182-2192, Jun. 2013.
    • (2013) IEEE Trans. Veh. Technol. , vol.62 , Issue.5 , pp. 2182-2192
    • Biswas, S.1    Misic, J.2
  • 13
    • 0142002511 scopus 로고    scopus 로고
    • The Elliptic Curve Digital Signature Algorithm (ECDSA)
    • Aug
    • D. Johnson, A. Menezes, and S. Vanstone, "The Elliptic Curve Digital Signature Algorithm (ECDSA)," Int. J. Inf. Security, vol. 1, no. 1, pp. 36-63, Aug. 2001.
    • (2001) Int. J. Inf. Security , vol.1 , Issue.1 , pp. 36-63
    • Johnson, D.1    Menezes, A.2    Vanstone, S.3
  • 14
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Feb
    • R. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Commun. ACM, vol. 21, no. 2, pp. 120-126, Feb. 1978.
    • (1978) Commun. ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.