메뉴 건너뛰기




Volumn 58, Issue 4, 2015, Pages 349-361

Privacy-aware access control for message exchange in vehicular ad hoc networks

Author keywords

Access control; Privacy; Secure message exchange; Security; Trusted platform module (TPM); Vehicular adhoc networks

Indexed keywords

ACCESS CONTROL; CRYPTOGRAPHY; DATA PRIVACY; NETWORK SECURITY;

EID: 84925535304     PISSN: 10184864     EISSN: 15729451     Source Type: Journal    
DOI: 10.1007/s11235-014-9881-8     Document Type: Article
Times cited : (6)

References (27)
  • 1
    • 34548731375 scopus 로고    scopus 로고
    • Bethencourt, J., Sahai, A., & Waters, B. (2007). Ciphertext-policy attribute-based encryption. In 2007 , SP ’07 (pp. 321–334). IEEE Computer Society: Washington, DC
    • Bethencourt, J., Sahai, A., & Waters, B. (2007). Ciphertext-policy attribute-based encryption. In 2007 IEEE Symposium on Security and Privacy, SP ’07 (pp. 321–334). IEEE Computer Society: Washington, DC.
    • IEEE Symposium on Security and Privacy
  • 4
    • 79957500047 scopus 로고    scopus 로고
    • Infotainment and road safety service support in vehicular networking: From a communication perspective
    • Cheng, H. T., Shan, H., & Zhuang, W. (2011). Infotainment and road safety service support in vehicular networking: From a communication perspective. Mechanical Systems and Signal Processing, 25(6), 2020–2038.
    • (2011) Mechanical Systems and Signal Processing , vol.25 , Issue.6 , pp. 2020-2038
    • Cheng, H.T.1    Shan, H.2    Zhuang, W.3
  • 5
    • 79958266788 scopus 로고    scopus 로고
    • Ppas: A privacy preservation authentication scheme for vehicle-to-infrastructure communication networks. In Consumer Electronics
    • Chuang, M.-C., & Lee, J.-F. (2011). Ppas: A privacy preservation authentication scheme for vehicle-to-infrastructure communication networks. In Consumer Electronics, Communications and Networks Conference (CECNet) (pp. 1509–1512).
    • (2011) Communications and Networks Conference (CECNet) , pp. 1509-1512
    • Chuang, M.-C.1    Lee, J.-F.2
  • 8
    • 77951262698 scopus 로고    scopus 로고
    • A TPM-based architecture for improved security and anonymity in vehicular ad hoc networks
    • Guette, G. & Heen O. (2009). A TPM-based architecture for improved security and anonymity in vehicular ad hoc networks. In 2009 IEEE Vehicular Networking Conference (VNC) (pp. 1–7).
    • (2009) In 2009 IEEE Vehicular Networking Conference (VNC) , pp. 1-7
    • Guette, G.1    Heen, O.2
  • 11
    • 79951975426 scopus 로고    scopus 로고
    • A distributed key management framework with cooperative message authentication in vanets
    • Hao, Y., Chengcheng, Y., Zhou, C., & Song, W. (2011). A distributed key management framework with cooperative message authentication in vanets. IEEE Journal on Selected Areas in Communications, 29(3), 616–629.
    • (2011) IEEE Journal on Selected Areas in Communications , vol.29 , Issue.3 , pp. 616-629
    • Hao, Y.1    Chengcheng, Y.2    Zhou, C.3    Song, W.4
  • 12
    • 78650760549 scopus 로고    scopus 로고
    • Hong, X., Huang, D., Gerla, M., & Cao, Z. (2008). SAT: Situation-aware trust architecture for vehicular networks. In ’08 (pp. 31–36). ACM
    • Hong, X., Huang, D., Gerla, M., & Cao, Z. (2008). SAT: Situation-aware trust architecture for vehicular networks. In 3rd international workshop on Mobility in the evolving Internet architecture, MobiArch ’08 (pp. 31–36). ACM.
    • 3rd international workshop on Mobility in the evolving Internet architecture, MobiArch
  • 13
    • 67650409731 scopus 로고    scopus 로고
    • ASPE: Attribute-based secure policy enforcement in vehicular ad hoc networks
    • Huang, D., & Verma, M. (2009). ASPE: Attribute-based secure policy enforcement in vehicular ad hoc networks. Ad Hoc Networks, 7(8), 1526–1535.
    • (2009) Ad Hoc Networks , vol.7 , Issue.8 , pp. 1526-1535
    • Huang, D.1    Verma, M.2
  • 14
    • 57749177974 scopus 로고    scopus 로고
    • Design of a network coverage analyzer for roadside-to-vehicle telematics networks. In International Conference on Software Engineering, Artificial Intelligence
    • Lee, J. (2008). Design of a network coverage analyzer for roadside-to-vehicle telematics networks. In International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, pp. 201–205.
    • (2008) Networking, and Parallel/Distributed Computing , pp. 201-205
    • Lee, J.1
  • 15
    • 51349156734 scopus 로고    scopus 로고
    • Lu, R., Lin, X., Zhu, H., Ho, P.-H., & Shen, X. (2008). ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications. In 27th (pp. 1229–1237). IEEE
    • Lu, R., Lin, X., Zhu, H., Ho, P.-H., & Shen, X. (2008). ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications. In 27th Conference on Computer Communications, INFOCOM (pp. 1229–1237). IEEE.
    • Conference on Computer Communications, INFOCOM
  • 16
    • 84870406370 scopus 로고    scopus 로고
    • Ddor: Destination discovery oriented routing in highway/freeway vanets
    • Sahu, P., Wu, E.-K., Sahoo, J., & Gerla, M. (2012). Ddor: Destination discovery oriented routing in highway/freeway vanets. Telecommunication Systems, 50, 267–284.
    • (2012) Telecommunication Systems , vol.50 , pp. 267-284
    • Sahu, P.1    Wu, E.-K.2    Sahoo, J.3    Gerla, M.4
  • 17
    • 67650661394 scopus 로고    scopus 로고
    • Saroiu, S., & Wolman, A. (2009). In 10th workshop on Mobile Computing Systems and Applications
    • Saroiu, S., & Wolman, A. (2009). Enabling new mobile applications with location proofs. In 10th workshop on Mobile Computing Systems and Applications.
    • Enabling new mobile applications with location proofs.
  • 20
    • 70449565205 scopus 로고    scopus 로고
    • Tacking together efficient authentication, revocation, and privacy in VANETs. In 6th Annual IEEE conference on Sensor
    • Studer, A., Shi, E., Bai, F., & Perrig, A. (2009). Tacking together efficient authentication, revocation, and privacy in VANETs. In 6th Annual IEEE conference on Sensor, Mesh and Ad Hoc Communications and Networks (pp. 484–492).
    • (2009) Mesh and Ad Hoc Communications and Networks , pp. 484-492
    • Studer, A.1    Shi, E.2    Bai, F.3    Perrig, A.4
  • 21
  • 24
    • 20444479906 scopus 로고    scopus 로고
    • Wang, L., Wijesekera, D., & Jajodia, S. (2004). A logic-based framework for attribute based access control. In 2004 , FMSE ’04 (pp. 45–55). ACM
    • Wang, L., Wijesekera, D., & Jajodia, S. (2004). A logic-based framework for attribute based access control. In 2004 ACM workshop on Formal methods in security engineering, FMSE ’04 (pp. 45–55). ACM.
    • ACM workshop on Formal methods in security engineering
  • 25
    • 84870455609 scopus 로고    scopus 로고
    • The multi-copy diversity for routing in sparse vehicular ad hoc networks
    • Yoo, J., Choi, S., & Kwon Kim, C. (2012). The multi-copy diversity for routing in sparse vehicular ad hoc networks. Telecommunication Systems, 50(4), 297–309.
    • (2012) Telecommunication Systems , vol.50 , Issue.4 , pp. 297-309
    • Yoo, J.1    Choi, S.2    Kwon Kim, C.3
  • 27
    • 38049003527 scopus 로고    scopus 로고
    • Zhang, Y., Zhao, J., & Cao, G. (2007). In 4th ACM international workshop on Vehicular ad hoc networks, VANET ’07 (pp. 9–18). ACM
    • Zhang, Y., Zhao, J., & Cao, G. (2007). On scheduling vehicle-roadside data access. In 4th ACM international workshop on Vehicular ad hoc networks, VANET ’07 (pp. 9–18). ACM.
    • On scheduling vehicle-roadside data access.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.