-
1
-
-
80052893572
-
On the performance of secure vehicular communication systems
-
Nov./Dec
-
G. Calandriello, P. Papadimitratos, A. Lioy, and J. P. Hubaux, "On the performance of secure vehicular communication systems," IEEE Trans. Dependable Secure Comput., vol. 8, no. 6, pp. 898-912, Nov./Dec. 2011.
-
(2011)
IEEE Trans. Dependable Secure Comput.
, vol.8
, Issue.6
, pp. 898-912
-
-
Calandriello, G.1
Papadimitratos, P.2
Lioy, A.3
Hubaux, J.P.4
-
2
-
-
80052847304
-
Trustworthy broadcasting in IEEE 802.11 p/WAVE vehicular networks: Delay analysis
-
Sep
-
A. Vinel, C. Campolo, J. Petit, and Y. Koucheryavy, "Trustworthy broadcasting in IEEE 802.11 p/WAVE vehicular networks: Delay analysis," IEEE Commun. Lett., vol. 15, no. 9, pp. 1010-1012, Sep. 2011.
-
(2011)
IEEE Commun. Lett.
, vol.15
, Issue.9
, pp. 1010-1012
-
-
Vinel, A.1
Campolo, C.2
Petit, J.3
Koucheryavy, Y.4
-
3
-
-
24944445896
-
Batch verification with ID-based signatures
-
H. J. Yoon, J. H. Cheon, and Y. Kim, "Batch verification with ID-based signatures," in Proc. ICISC LNCS, 2005, vol. 3506, pp. 233-248.
-
(2005)
Proc. ICISC LNCS
, vol.3506
, pp. 233-248
-
-
Yoon, H.J.1
Cheon, J.H.2
Kim, Y.3
-
4
-
-
84864125413
-
Secure delegation-based authentication protocol for wireless roaming service
-
Jul
-
J. L. Tsai, N. W. Lo, and T. C. Wu, "Secure delegation-based authentication protocol for wireless roaming service," IEEE Commun. Lett., vol. 16, no. 7, pp. 1100-1102, Jul. 2012.
-
(2012)
IEEE Commun. Lett.
, vol.16
, Issue.7
, pp. 1100-1102
-
-
Tsai, J.L.1
Lo, N.W.2
Wu, T.C.3
-
5
-
-
84886653936
-
Novel anonymous authentication scheme using smart cards
-
Nov
-
J. L. Tsai, N. W. Lo, and T. C. Wu, "Novel anonymous authentication scheme using smart cards," IEEE Trans. Ind. Informat., vol. 9, no. 4, pp. 2004-2013, Nov. 2013.
-
(2013)
IEEE Trans. Ind. Informat.
, vol.9
, Issue.4
, pp. 2004-2013
-
-
Tsai, J.L.1
Lo, N.W.2
Wu, T.C.3
-
6
-
-
51449098979
-
An efficient identity based batch verification scheme for vehicular sensor networks
-
C. Zhang, R. Lu, X. Lin, P. H. Ho, and X. Shen, "An efficient identity based batch verification scheme for vehicular sensor networks," in Proc. IEEE INFOCOM, 2008, pp. 246-250.
-
(2008)
Proc. IEEE INFOCOM
, pp. 246-250
-
-
Zhang, C.1
Lu, R.2
Lin, X.3
Ho, P.H.4
Shen, X.5
-
7
-
-
67349168446
-
BAT: A robust signature scheme for vehicular networks using binary authentication tree
-
Apr
-
Y. Jiang, M. Shi, and X. S. Shen, "BAT: A robust signature scheme for vehicular networks using binary authentication tree," IEEE Trans. Wireless Commun., vol. 8, no. 4, pp. 1974-1983, Apr. 2009.
-
(2009)
IEEE Trans. Wireless Commun.
, vol.8
, Issue.4
, pp. 1974-1983
-
-
Jiang, Y.1
Shi, M.2
Shen, X.S.3
-
8
-
-
77956061255
-
An ID-based aggregate signature scheme with constant pairing computations
-
Oct
-
K. A. Shim, "An ID-based aggregate signature scheme with constant pairing computations," J. Syst. Softw., vol. 83, no. 10, pp. 1873-1880, Oct. 2010.
-
(2010)
J. Syst. Softw.
, vol.83
, Issue.10
, pp. 1873-1880
-
-
Shim, K.A.1
-
9
-
-
84861148363
-
CPAS: An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks
-
K. A. Shim, "CPAS: An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks," IEEE Trans. Veh. Technol., vol. 61, no. 4, pp. 1874-1883, May 2012.
-
(2012)
IEEE Trans. Veh. Technol.
, vol.61
, Issue.4
, pp. 1874-1883
-
-
Shim, K.A.1
-
10
-
-
84873964062
-
On the potential of PUF for pseudonym generation in vehicular networks
-
J. Petit, C. Bosch, M. Feiri, and F. Kargl, "On the potential of PUF for pseudonym generation in vehicular networks," in Proc. IEEE VNC, 2012, pp. 94-100.
-
(2012)
Proc. IEEE VNC
, pp. 94-100
-
-
Petit, J.1
Bosch, C.2
Feiri, M.3
Kargl, F.4
-
11
-
-
84895068441
-
Reconstruction of a secure authentication scheme for vehicular ad hoc networks using a binary authentication tree
-
Nov
-
K. A. Shim, "Reconstruction of a secure authentication scheme for vehicular ad hoc networks using a binary authentication tree," IEEE Trans. Wireless Commun., vol. 12, no. 11, pp. 5386-5393, Nov. 2013.
-
(2013)
IEEE Trans. Wireless Commun.
, vol.12
, Issue.11
, pp. 5386-5393
-
-
Shim, K.A.1
-
12
-
-
84879136091
-
A cross-layer approach to privacy-preserving authentication in WAVE-enabled VANETs
-
Jun
-
S. Biswas and J. Misic, "A cross-layer approach to privacy-preserving authentication in WAVE-enabled VANETs," IEEE Trans. Veh. Technol., vol. 62, no. 5, pp. 2182-2192, Jun. 2013.
-
(2013)
IEEE Trans. Veh. Technol.
, vol.62
, Issue.5
, pp. 2182-2192
-
-
Biswas, S.1
Misic, J.2
-
13
-
-
0142002511
-
The Elliptic Curve Digital Signature Algorithm (ECDSA)
-
Aug
-
D. Johnson, A. Menezes, and S. Vanstone, "The Elliptic Curve Digital Signature Algorithm (ECDSA)," Int. J. Inf. Security, vol. 1, no. 1, pp. 36-63, Aug. 2001.
-
(2001)
Int. J. Inf. Security
, vol.1
, Issue.1
, pp. 36-63
-
-
Johnson, D.1
Menezes, A.2
Vanstone, S.3
-
14
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Feb
-
R. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Commun. ACM, vol. 21, no. 2, pp. 120-126, Feb. 1978.
-
(1978)
Commun. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
|