메뉴 건너뛰기




Volumn 10, Issue 6, 2015, Pages 1109-1124

Short Dynamic Group Signature Scheme Supporting Controllable Linkability

Author keywords

Anonymity; Group signature; Linkability; Privacy

Indexed keywords

AD HOC NETWORKS; AUTHENTICATION; COMPUTER OPERATING SYSTEMS; CRYPTOGRAPHY; DATA MINING; DATA PRIVACY; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; TELECOMMUNICATION NETWORKS; VEHICULAR AD HOC NETWORKS;

EID: 84928155442     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2015.2390497     Document Type: Article
Times cited : (55)

References (58)
  • 1
    • 84921018856 scopus 로고    scopus 로고
    • A practical and provably secure coalition-resistant group signature scheme
    • Advances in Cryptology Berlin, Germany: Springer-Verlag
    • G. Ateniese, J. Camenisch, M. Joye, and G. Tsudik, "A practical and provably secure coalition-resistant group signature scheme," in Advances in Cryptology (Lecture Notes in Computer Science), vol. 1880. Berlin, Germany: Springer-Verlag, 2000, pp. 255-270.
    • (2000) Lecture Notes in Computer Science , vol.1880 , pp. 255-270
    • Ateniese, G.1    Camenisch, J.2    Joye, M.3    Tsudik, G.4
  • 2
    • 38149009170 scopus 로고    scopus 로고
    • Short signatures without random oracles and the SDH assumption in bilinear groups
    • D. Boneh and X. Boyen, "Short signatures without random oracles and the SDH assumption in bilinear groups," J. Cryptol., vol. 21, no. 2, pp. 149-177, 2008.
    • (2008) J. Cryptol. , vol.21 , Issue.2 , pp. 149-177
    • Boneh, D.1    Boyen, X.2
  • 3
    • 35048887476 scopus 로고    scopus 로고
    • Short group signatures
    • Advances in Cryptology Berlin, Germany: Springer-Verlag
    • D. Boneh, X. Boyen, and H. Shacham, "Short group signatures," in Advances in Cryptology (Lecture Notes in Computer Science), vol. 3152. Berlin, Germany: Springer-Verlag, 2004, pp. 41-55.
    • (2004) Lecture Notes in Computer Science , vol.3152 , pp. 41-55
    • Boneh, D.1    Boyen, X.2    Shacham, H.3
  • 6
    • 70349608477 scopus 로고    scopus 로고
    • Simplified security notions of direct anonymous attestation and a concrete scheme from pairings
    • E. Brickell, L. Chen, and J. Li, "Simplified security notions of direct anonymous attestation and a concrete scheme from pairings," Int. J. Inf. Security, vol. 8, no. 5, pp. 315-330, 2009.
    • (2009) Int. J. Inf. Security , vol.8 , Issue.5 , pp. 315-330
    • Brickell, E.1    Chen, L.2    Li, J.3
  • 8
    • 52149109136 scopus 로고    scopus 로고
    • Expressive subgroup signatures
    • Security and Cryptography for Networks Berlin, Germany: Springer-Verlag
    • X. Boyen and C. Delerablee, "Expressive subgroup signatures," in Security and Cryptography for Networks (Lecture Notes in Computer Science), vol. 5229. Berlin, Germany: Springer-Verlag, 2008, pp. 185-200.
    • (2008) Lecture Notes in Computer Science , vol.5229 , pp. 185-200
    • Boyen, X.1    Delerablee, C.2
  • 10
    • 35248843604 scopus 로고    scopus 로고
    • Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions
    • Advances in Cryptology Berlin, Germany: Springer-Verlag
    • M. Bellare, D. Micciancio, and B. Warinschi, "Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions," in Advances in Cryptology (Lecture Notes in Computer Science), vol. 2656. Berlin, Germany: Springer-Verlag, 2003, pp. 614-629.
    • (2003) Lecture Notes in Computer Science , vol.2656 , pp. 614-629
    • Bellare, M.1    Micciancio, D.2    Warinschi, B.3
  • 12
    • 24144477851 scopus 로고    scopus 로고
    • Foundations of group signatures: The case of dynamic groups
    • Topics in Cryptology Berlin, Germany: Springer-Verlag
    • M. Bellare, H. Shi, and C. Zang, "Foundations of group signatures: The case of dynamic groups," in Topics in Cryptology (Lecture Notes in Computer Science), vol. 3376. Berlin, Germany: Springer-Verlag, 2004, pp. 136-153.
    • (2004) Lecture Notes in Computer Science , vol.3376 , pp. 136-153
    • Bellare, M.1    Shi, H.2    Zang, C.3
  • 13
    • 14844309671 scopus 로고    scopus 로고
    • Group signatures with verifier-local revocation
    • D. Boneh and H. Shacham, "Group signatures with verifier-local revocation," in Proc. ACM CCS, 2004, pp. 168-177.
    • Proc. ACM CCS, 2004 , pp. 168-177
    • Boneh, D.1    Shacham, H.2
  • 14
    • 33746042155 scopus 로고    scopus 로고
    • Compact group signatures without random oracles
    • Berlin, Germany: Springer-Verlag
    • X. Boyen and B. Waters, "Compact group signatures without random oracles," in Advances in Cryptology, vol. 4004. Berlin, Germany: Springer-Verlag, 2006, pp. 427-444.
    • (2006) Advances in Cryptology , vol.4004 , pp. 427-444
    • Boyen, X.1    Waters, B.2
  • 15
    • 37149007674 scopus 로고    scopus 로고
    • Full-domain subgroup hiding and constant-size group signatures
    • Berlin, Germany: Springer-Verlag
    • X. Boyen and B. Waters, "Full-domain subgroup hiding and constant-size group signatures," in Public Key Cryptography, vol. 4450. Berlin, Germany: Springer-Verlag, 2007, pp. 1-15.
    • (2007) Public Key Cryptography , vol.4450 , pp. 1-15
    • Boyen, X.1    Waters, B.2
  • 16
    • 70349292369 scopus 로고    scopus 로고
    • Efficient attributes for anonymous credentials
    • J. Camenisch and T. Groß, "Efficient attributes for anonymous credentials," in Proc. ACM CCS, 2004, pp. 345-356.
    • Proc. ACM CCS, 2004 , pp. 345-356
    • Camenisch, J.1    Groß, T.2
  • 17
    • 24944435537 scopus 로고    scopus 로고
    • Compact E-cash
    • Advances in Cryptology Berlin, Germany: Springer-Verlag
    • J. Camenisch, S. Hohenberger, and A. Lysyanskaya, "Compact E-cash," in Advances in Cryptology (Lecture Notes in Computer Science), vol. 3494. Berlin, Germany: Springer-Verlag, 2005, pp. 302-321.
    • (2005) Lecture Notes in Computer Science , vol.3494 , pp. 302-321
    • Camenisch, J.1    Hohenberger, S.2    Lysyanskaya, A.3
  • 18
    • 84937428748 scopus 로고    scopus 로고
    • Dynamic accumulators and application to efficient revocation of anonymous credentials
    • Advances in Cryptology Berlin, Germany: Springer-Verlag
    • J. Camenisch and A. Lysyanskaya, "Dynamic accumulators and application to efficient revocation of anonymous credentials," in Advances in Cryptology (Lecture Notes in Computer Science), vol. 2442. Berlin, Germany: Springer-Verlag, 2002, pp. 61-76.
    • (2002) Lecture Notes in Computer Science , vol.2442 , pp. 61-76
    • Camenisch, J.1    Lysyanskaya, A.2
  • 19
    • 33749000965 scopus 로고    scopus 로고
    • A general certification framework with applications to privacy-enhancing certificate infrastructures
    • Berlin, Germany: Springer-Verlag
    • J. Camenisch, D. Sommer, and R. Zimmermann, "A general certification framework with applications to privacy-enhancing certificate infrastructures," in Security and Privacy in Dynamic Environments. Berlin, Germany: Springer-Verlag, 2006.
    • (2006) Security and Privacy in Dynamic Environments
    • Camenisch, J.1    Sommer, D.2    Zimmermann, R.3
  • 21
    • 85024290278 scopus 로고
    • Group Signatures
    • Advances in Cryptology Berlin, Germany: Springer-Verlag
    • D. Chaum and E. van Heyst, "Group Signatures," in Advances in Cryptology (Lecture Notes in Computer Science), vol. 547. Berlin, Germany: Springer-Verlag, 1991, pp. 257-265.
    • (1991) Lecture Notes in Computer Science , vol.547 , pp. 257-265
    • Chaum, D.1    Van Heyst, E.2
  • 22
    • 84889075587 scopus 로고    scopus 로고
    • Flexible and scalable digital signatures in TPM 2.0
    • L. Chen and J. Li, "Flexible and scalable digital signatures in TPM 2.0," in Proc. ACM CCS, 2013, pp. 37-48.
    • Proc. ACM CCS, 2013 , pp. 37-48
    • Chen, L.1    Li, J.2
  • 23
    • 33845243601 scopus 로고    scopus 로고
    • Short traceable signatures based on bilinear pairings
    • Advances in Information and Computer Security Berlin, Germany: Springer-Verlag
    • S. G. Choi, K. Park, and M. Yung, "Short traceable signatures based on bilinear pairings," in Advances in Information and Computer Security (Lecture Notes in Computer Science), vol. 4266. Berlin, Germany: Springer-Verlag, 2006, pp. 88-103.
    • (2006) Lecture Notes in Computer Science , vol.4266 , pp. 88-103
    • Choi, S.G.1    Park, K.2    Yung, M.3
  • 24
    • 84887308796 scopus 로고    scopus 로고
    • Escrowed linkability of ring signatures and its applications
    • Progress in Cryptology Berlin, Germany: Springer-Verlag
    • S. S. M. Chow, W. Susilo, and T. H. Yuen, "Escrowed linkability of ring signatures and its applications," in Progress in Cryptology (Lecture Notes in Computer Science), vol. 4341. Berlin, Germany: Springer-Verlag, 2006, pp. 175-192.
    • (2006) Lecture Notes in Computer Science , vol.4341 , pp. 175-192
    • Chow, S.S.M.1    Susilo, W.2    Yuen, T.H.3
  • 25
    • 84887276320 scopus 로고    scopus 로고
    • Dynamic fully anonymous short group signatures
    • Progress in Cryptology Berlin, Germany: Springer-Verlag
    • C. Delerablée and D. Pointcheval, "Dynamic fully anonymous short group signatures," in Progress in Cryptology (Lecture Notes in Computer Science), vol. 4341. Berlin, Germany: Springer-Verlag, 2006, pp. 193-210.
    • (2006) Lecture Notes in Computer Science , vol.4341 , pp. 193-210
    • Delerablée, C.1    Pointcheval, D.2
  • 26
    • 38149112556 scopus 로고    scopus 로고
    • Attacking unlinkability: The importance of context
    • Privacy Enhancing Technologies Berlin, Germany: Springer-Verlag
    • M. Franz, B. Meyer, and A. Pashalidis, "Attacking unlinkability: The importance of context," in Privacy Enhancing Technologies (Lecture Notes in Computer Science), vol. 4776. Berlin, Germany: Springer-Verlag, 2007, pp. 1-16.
    • (2007) Lecture Notes in Computer Science , vol.4776 , pp. 1-16
    • Franz, M.1    Meyer, B.2    Pashalidis, A.3
  • 27
    • 84946827596 scopus 로고    scopus 로고
    • Threshold cryptosystems secure against chosen-ciphertext attacks
    • Advances in Cryptology Berlin, Germany: Springer-Verlag
    • P.-A. Fouque and D. Pointcheval, "Threshold cryptosystems secure against chosen-ciphertext attacks," in Advances in Cryptology (Lecture Notes in Computer Science), vol. 2248. Berlin, Germany: Springer-Verlag, 2001, pp. 351-368.
    • (2001) Lecture Notes in Computer Science , vol.2248 , pp. 351-368
    • Fouque, P.-A.1    Pointcheval, D.2
  • 29
    • 78650842020 scopus 로고    scopus 로고
    • A group signature scheme from lattice assumptions
    • Advances in Cryptology Berlin, Germany: Springer-Verlag
    • S. D. Gordon, J. Katz, and V. Vaikuntanathan, "A group signature scheme from lattice assumptions," in Advances in Cryptology (Lecture Notes in Computer Science), vol. 6477. Berlin, Germany: Springer-Verlag, 2010, pp. 395-412.
    • (2010) Lecture Notes in Computer Science , vol.6477 , pp. 395-412
    • Gordon, S.D.1    Katz, J.2    Vaikuntanathan, V.3
  • 30
    • 38149097733 scopus 로고    scopus 로고
    • Fully anonymous group signatures without random oracles
    • Advances in Cryptology Berlin, Germany: Springer-Verlag
    • J. Groth, "Fully anonymous group signatures without random oracles," in Advances in Cryptology (Lecture Notes in Computer Science), vol. 4833. Berlin, Germany: Springer-Verlag, 2007, pp. 164-180.
    • (2007) Lecture Notes in Computer Science , vol.4833 , pp. 164-180
    • Groth, J.1
  • 31
    • 48649088209 scopus 로고    scopus 로고
    • A group signature based secure and privacy-preserving vehicular communication framework
    • J. Guo, J. P. Baugh, and S. Wang, "A group signature based secure and privacy-preserving vehicular communication framework," in Proc. Mobile Netw. Veh. Environ., May 2007, pp. 103-108.
    • Proc. Mobile Netw. Veh. Environ., May 2007 , pp. 103-108
    • Guo, J.1    Baugh, J.P.2    Wang, S.3
  • 33
    • 0344875575 scopus 로고    scopus 로고
    • Information hiding, anonymity and privacy: A modular approach
    • D. Hughes and V. Shmatikov, "Information hiding, anonymity and privacy: A modular approach," J. Comput. Secur., vol. 12, no. 1, pp. 3-36, 2004.
    • (2004) J. Comput. Secur. , vol.12 , Issue.1 , pp. 3-36
    • Hughes, D.1    Shmatikov, V.2
  • 35
    • 84870064630 scopus 로고    scopus 로고
    • Group signatures with controllable linkability for dynamic membership
    • Feb.
    • J. Y. Hwang, S. Lee, B.-H. Chung, H. S. Cho, and D. Nyang, "Group signatures with controllable linkability for dynamic membership," Inf. Sci., vol. 222, pp. 761-778, Feb. 2013.
    • (2013) Inf. Sci. , vol.222 , pp. 761-778
    • Hwang, J.Y.1    Lee, S.2    Chung, B.-H.3    Cho, H.S.4    Nyang, D.5
  • 36
    • 50049096014 scopus 로고    scopus 로고
    • Fair blind signatures revisited
    • Pairing-Based Cryptography Berlin, Germany: Springer-Verlag
    • E. Hufschmitt and J. Traoré, "Fair blind signatures revisited," in Pairing-Based Cryptography (Lecture Notes in Computer Science), vol. 4575. Berlin, Germany: Springer-Verlag, 2007, pp. 268-292.
    • (2007) Lecture Notes in Computer Science , vol.4575 , pp. 268-292
    • Hufschmitt, E.1    Traoré, J.2
  • 38
    • 24944524118 scopus 로고    scopus 로고
    • Group signatures with efficient concurrent join
    • Advances in Cryptology Berlin, Germany: Springer-Verlag
    • A. Kiayias and M. Yung, "Group signatures with efficient concurrent join," in Advances in Cryptology (Lecture Notes in Computer Science), vol. 3494. Berlin, Germany: Springer-Verlag, 2005, pp. 198-214.
    • (2005) Lecture Notes in Computer Science , vol.3494 , pp. 198-214
    • Kiayias, A.1    Yung, M.2
  • 39
    • 35048841283 scopus 로고    scopus 로고
    • Traceable signatures
    • Advances in Cryptology Berlin, Germany: Springer-Verlag
    • A. Kiayias, Y. Tsiounis, and M. Yung, "Traceable signatures," in Advances in Cryptology (Lecture Notes in Computer Science), vol. 3027. Berlin, Germany: Springer-Verlag, 2004, pp. 571-589.
    • (2004) Lecture Notes in Computer Science , vol.3027 , pp. 571-589
    • Kiayias, A.1    Tsiounis, Y.2    Yung, M.3
  • 40
    • 84928104876 scopus 로고    scopus 로고
    • Lattice-based group signature scheme with verifier-local revocation
    • Public-Key Cryptography Berlin, Germany: Springer-Verlag
    • A. Langlois, S. Ling, K. Nguyen, and H. Wang, "Lattice-based group signature scheme with verifier-local revocation," in Public-Key Cryptography (Lecture Notes in Computer Science), vol. 4833. Berlin, Germany: Springer-Verlag, 2007, pp. 164-180.
    • (2007) Lecture Notes in Computer Science , vol.4833 , pp. 164-180
    • Langlois, A.1    Ling, S.2    Nguyen, K.3    Wang, H.4
  • 41
    • 35048825874 scopus 로고    scopus 로고
    • Linkable spontaneous anonymous group signature for ad hoc groups
    • Information Security and Privacy Berlin, Germany: Springer-Verlag
    • J. K. Liu, V. K. Wei, and D. S. Wong, "Linkable spontaneous anonymous group signature for ad hoc groups," in Information Security and Privacy (Lecture Notes in Computer Science), vol. 3108. Berlin, Germany: Springer-Verlag, 2004, pp. 325-335.
    • (2004) Lecture Notes in Computer Science , vol.3108 , pp. 325-335
    • Liu, J.K.1    Wei, V.K.2    Wong, D.S.3
  • 42
    • 79751538351 scopus 로고    scopus 로고
    • Efficient traceable signatures in the standard model
    • Mar.
    • B. Libert and M. Yung, "Efficient traceable signatures in the standard model," Theoretical Comput. Sci., vol. 412, nos. 12-14, pp. 1220-1242, Mar. 2011.
    • (2011) Theoretical Comput. Sci. , vol.412 , Issue.12-14 , pp. 1220-1242
    • Libert, B.1    Yung, M.2
  • 43
    • 34247385140 scopus 로고    scopus 로고
    • Democratic group signatures: On an example of joint ventures
    • M. Manulis, "Democratic group signatures: On an example of joint ventures," in Proc. ASIACCS, 2006, pp. 365-201.
    • Proc. ASIACCS, 2006 , pp. 365-1201
    • Manulis, M.1
  • 44
    • 33745600128 scopus 로고    scopus 로고
    • Linkable democratic group signatures
    • Information Security Practice and Experience Berlin, Germany: Springer-Verlag
    • M. Manulis, A.-R. Sadeghi, and J. Schwenk, "Linkable democratic group signatures," in Information Security Practice and Experience (Lecture Notes in Computer Science), vol. 3903. Berlin, Germany: Springer-Verlag, 2006, pp. 187-201.
    • (2006) Lecture Notes in Computer Science , vol.3903 , pp. 187-201
    • Manulis, M.1    Sadeghi, A.-R.2    Schwenk, J.3
  • 45
    • 33746100516 scopus 로고    scopus 로고
    • Cryptography from pairings
    • Cambridge, U.K.: Cambridge Univ. Press, ch. 10
    • K. G. Paterson, "Cryptography from pairings," in Advances in Elliptic Curve Cryptography, vol. 317. Cambridge, U.K.: Cambridge Univ. Press, 2005, ch. 10, pp. 215-251.
    • (2005) Advances in Elliptic Curve Cryptography , vol.317 , pp. 215-251
    • Paterson, K.G.1
  • 46
    • 84987607367 scopus 로고    scopus 로고
    • Available: accessed Jun. 2014
    • PBC Library. [Online]. Available: http://crypto.stanford.edu/pbc, accessed Jun. 2014.
    • PBC Library. [Online]
  • 47
    • 80051488947 scopus 로고    scopus 로고
    • Pairing-friendly curves with minimal security loss by Cheon's algorithm
    • C.-M. Park and H.-S. Lee, "Pairing-friendly curves with minimal security loss by Cheon's algorithm," ETRI J., vol. 33, no. 4, pp. 656-659, 2011.
    • (2011) ETRI J. , vol.33 , Issue.4 , pp. 656-659
    • Park, C.-M.1    Lee, H.-S.2
  • 48
    • 0000901529 scopus 로고    scopus 로고
    • Security arguments for digital signatures and blind signatures
    • D. Pointcheval and J. Stern, "Security arguments for digital signatures and blind signatures," J. Cryptol., vol. 13, no. 3, pp. 361-369, 2000.
    • (2000) J. Cryptol. , vol.13 , Issue.3 , pp. 361-369
    • Pointcheval, D.1    Stern, J.2
  • 49
    • 77956735087 scopus 로고    scopus 로고
    • An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications
    • Sep.
    • Y. Sun, R. Lu, X. Lin, X. Shen, and J. Su, "An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications," IEEE Trans. Veh. Technol., vol. 59, no. 7, pp. 3589-3603, Sep. 2010.
    • (2010) IEEE Trans. Veh. Technol. , vol.59 , Issue.7 , pp. 3589-3603
    • Sun, Y.1    Lu, R.2    Lin, X.3    Shen, X.4    Su, J.5
  • 50
    • 47949086407 scopus 로고    scopus 로고
    • An ID-based framework achieving privacy and non-repudiation in vehicular ad hoc networks
    • J. Sun, C. Zhang, and Y. Fang, "An ID-based framework achieving privacy and non-repudiation in vehicular ad hoc networks," in Proc. IEEE Military Commun. Conf., Oct. 2007, pp. 1-7.
    • Proc. IEEE Military Commun. Conf., Oct. 2007 , pp. 1-7
    • Sun, J.1    Zhang, C.2    Fang, Y.3
  • 51
    • 24644503853 scopus 로고    scopus 로고
    • Separable linkable threshold ring signatures
    • Progress in Cryptology Berlin, Germany: Springer-Verlag
    • P. P. Tsang, V. K. Wei, T. K. Chan, M. H. Au, J. K. Liu, and D. S. Wong, "Separable linkable threshold ring signatures," in Progress in Cryptology (Lecture Notes in Computer Science), vol. 3348. Berlin, Germany: Springer-Verlag, 2004, pp. 337-376.
    • (2004) Lecture Notes in Computer Science , vol.3348 , pp. 337-376
    • Tsang, P.P.1    Wei, V.K.2    Chan, T.K.3    Au, M.H.4    Liu, J.K.5    Wong, D.S.6
  • 52
    • 57049129831 scopus 로고    scopus 로고
    • An efficient message authentication scheme for vehicular communications
    • Nov.
    • C. Zhang, X. Lin, R. Lu, P.-H. Ho, and X. Shen, "An efficient message authentication scheme for vehicular communications," IEEE Trans. Veh. Technol., vol. 57, no. 6, pp. 3357-3368, Nov. 2008.
    • (2008) IEEE Trans. Veh. Technol. , vol.57 , Issue.6 , pp. 3357-3368
    • Zhang, C.1    Lin, X.2    Lu, R.3    Ho, P.-H.4    Shen, X.5
  • 53
    • 84928106756 scopus 로고    scopus 로고
    • Available: accessed Jun. 2014
    • TCG TPM V1.2 Specification. [Online]. Available: http://www.trustedcomputinggroup.org/resources/tpm-main-specification, accessed Jun. 2014.
    • TCG TPM V1.2 Specification. [Online]
  • 54
    • 0344628463 scopus 로고    scopus 로고
    • Accumulating composites and improved group signing
    • Advances in Cryptology Berlin, Germany: Springer-Verlag
    • G. Tsudik and S. Xu, "Accumulating composites and improved group signing," in Advances in Cryptology (Lecture Notes in Computer Science), vol. 2894. Berlin, Germany: Springer-Verlag, 2003, pp. 269-286.
    • (2003) Lecture Notes in Computer Science , vol.2894 , pp. 269-286
    • Tsudik, G.1    Xu, S.2
  • 56
    • 33646002029 scopus 로고    scopus 로고
    • Tracing-by-linking group signatures
    • Information Security Berlin, Germany: Springer-Verlag
    • V. K. Wei, "Tracing-by-linking group signatures," in Information Security (Lecture Notes in Computer Science), vol. 3650. Berlin, Germany: Springer-Verlag, 2005, pp. 149-163.
    • (2005) Lecture Notes in Computer Science , vol.3650 , pp. 149-163
    • Wei, V.K.1
  • 57
    • 77249157951 scopus 로고    scopus 로고
    • Balanced trustworthiness, safety, and privacy in vehicle-to-vehicle communications
    • Feb.
    • Q. Wu, J. Domingo-Ferrer, and U. Gonzalez-Nicolas, "Balanced trustworthiness, safety, and privacy in vehicle-to-vehicle communications," IEEE Trans. Veh. Technol., vol. 59, no. 2, pp. 559-573, Feb. 2010.
    • (2010) IEEE Trans. Veh. Technol. , vol.59 , Issue.2 , pp. 559-573
    • Wu, Q.1    Domingo-Ferrer, J.2    Gonzalez-Nicolas, U.3
  • 58
    • 77249166657 scopus 로고    scopus 로고
    • Anonymous user communication for privacy protection in wireless metropolitan mesh networks
    • Feb.
    • Z. Wan, K. Ren, B. Zhu, B. Preneel, and M. Gu, "Anonymous user communication for privacy protection in wireless metropolitan mesh networks," IEEE Trans. Veh. Technol., vol. 59, no. 2, pp. 519-532, Feb. 2010.
    • (2010) IEEE Trans. Veh. Technol. , vol.59 , Issue.2 , pp. 519-532
    • Wan, Z.1    Ren, K.2    Zhu, B.3    Preneel, B.4    Gu, M.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.