-
1
-
-
84936866482
-
-
Specification of the Identity Mixer Cryptographic Library-Version 2.3.40
-
"Specification of the Identity Mixer Cryptographic Library-Version 2.3.40," IBM Research-Zurich, 2013.
-
(2013)
IBM Research-Zurich
-
-
-
2
-
-
85012908743
-
One-way accumulators: A decentralized alternative to digital signatures
-
Springer
-
J. Benaloh and M. De Mare, "One-way accumulators: A decentralized alternative to digital signatures," in Advances in Cryptology- EUROCRYPT93. Springer, 1994, pp. 274-285.
-
(1994)
Advances in Cryptology- EUROCRYPT93
, pp. 274-285
-
-
Benaloh, J.1
De Mare, M.2
-
3
-
-
84900573989
-
A generic public key infrastructure for securing car-to-x communication
-
Orlando, USA
-
N. Bissmeyer, H. Stubing, E. Schoch, S. Gotz, J. P. Stotz, and B. Lonc, "A generic public key infrastructure for securing car-to-x communication," in 18th ITS World Congress, Orlando, USA, 2011.
-
(2011)
18th ITS World Congress
-
-
Bissmeyer, N.1
Stubing, H.2
Schoch, E.3
Gotz, S.4
Stotz, J.P.5
Lonc, B.6
-
4
-
-
37849048533
-
Efficient and robust pseudonymous authentication in VANET
-
ACM
-
G. Calandriello, P. Papadimitratos, J.-P. Hubaux, and A. Lioy, "Efficient and robust pseudonymous authentication in VANET," in Proceedings of the fourth ACM international workshop on Vehicular ad hoc networks. ACM, 2007, pp. 19-28.
-
(2007)
Proceedings of the Fourth ACM International Workshop on Vehicular Ad Hoc Networks
, pp. 19-28
-
-
Calandriello, G.1
Papadimitratos, P.2
Hubaux, J.-P.3
Lioy, A.4
-
5
-
-
34547379480
-
How to win the clonewars: Efficient periodic n-times anonymous authentication
-
ACM
-
J. Camenisch, S. Hohenberger, M. Kohlweiss, A. Lysyanskaya, and M. Meyerovich, "How to win the clonewars: efficient periodic n-times anonymous authentication," in Proceedings of the 13th ACM conference on Computer and communications security. ACM, 2006, pp. 201-210.
-
(2006)
Proceedings of the 13th ACM Conference on Computer and Communications Security
, pp. 201-210
-
-
Camenisch, J.1
Hohenberger, S.2
Kohlweiss, M.3
Lysyanskaya, A.4
Meyerovich, M.5
-
6
-
-
67049119910
-
An accumulator based on bilinear maps and efficient revocation for anonymous credentials
-
Springer
-
J. Camenisch, M. Kohlweiss, and C. Soriente, "An accumulator based on bilinear maps and efficient revocation for anonymous credentials," in Public Key Cryptography-PKC 2009. Springer, 2009, pp. 481-500.
-
(2009)
Public Key Cryptography-PKC 2009
, pp. 481-500
-
-
Camenisch, J.1
Kohlweiss, M.2
Soriente, C.3
-
7
-
-
84937428748
-
Dynamic accumulators and application to efficient revocation of anonymous credentials
-
Springer
-
J. Camenisch and A. Lysyanskaya, "Dynamic accumulators and application to efficient revocation of anonymous credentials," in Advances in Cryptology-CRYPTO 2002. Springer, 2002, pp. 61-76.
-
(2002)
Advances in Cryptology-CRYPTO 2002
, pp. 61-76
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
8
-
-
35248839965
-
A signature scheme with efficient protocols
-
Springer
-
-, "A signature scheme with efficient protocols," in Security in communication networks. Springer, 2003, pp. 268-289.
-
(2003)
Security in Communication Networks
, pp. 268-289
-
-
-
9
-
-
35048845114
-
Signature schemes and anonymous credentials from bilinear maps
-
Springer
-
-, "Signature schemes and anonymous credentials from bilinear maps," in Advances in Cryptology-CRYPTO 2004. Springer, 2004, pp. 56-72.
-
(2004)
Advances in Cryptology-CRYPTO 2004
, pp. 56-72
-
-
-
11
-
-
84936852062
-
-
CAR 2 CAR Communication Consortium "C2C-CC public key infrastructure memo" Feb.
-
CAR 2 CAR Communication Consortium, "C2C-CC public key infrastructure memo," CAR 2 CAR Communication Consortium, Technical Report, Feb. 2011.
-
(2011)
CAR 2 CAR Communication Consortium, Technical Report
-
-
-
13
-
-
0022145479
-
Security without identification: Transaction systems to make big brother obsolete
-
D. Chaum, "Security without identification: Transaction systems to make big brother obsolete," Communications of the ACM, vol. 28, no. 10, pp. 1030-1044, 1985.
-
(1985)
Communications of the ACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum, D.1
-
14
-
-
84892437849
-
PPREM: Privacy preserving REvocation mechanism for vehicular ad hoc networks
-
Mar.
-
C. Ganan, J. L. Munoz, O. Esparza, J. Mata-Diaz, and J. Alins, "PPREM: Privacy preserving REvocation mechanism for vehicular ad hoc networks," Computer Standards and Interfaces, vol. 36, no. 3, pp. 513-523, Mar. 2014.
-
(2014)
Computer Standards and Interfaces
, vol.36
, Issue.3
, pp. 513-523
-
-
Ganan, C.1
Munoz, J.L.2
Esparza, O.3
Mata-Diaz, J.4
Alins, J.5
-
16
-
-
48649088209
-
A group signature based secure and privacy-preserving vehicular communication framework
-
IEEE
-
J. Guo, J. P. Baugh, and S. Wang, "A group signature based secure and privacy-preserving vehicular communication framework," in 2007 Mobile Networking for Vehicular Environments. IEEE, 2007, pp. 103-108.
-
(2007)
2007 Mobile Networking for Vehicular Environments
, pp. 103-108
-
-
Guo, J.1
Baugh, J.P.2
Wang, S.3
-
18
-
-
0142002511
-
The elliptic curve digital signature algorithm (ECDSA)
-
D. Johnson, A. Menezes, and S. Vanstone, "The elliptic curve digital signature algorithm (ECDSA)," International Journal of Information Security, vol. 1, no. 1, pp. 36-63, 2001.
-
(2001)
International Journal of Information Security
, vol.1
, Issue.1
, pp. 36-63
-
-
Johnson, D.1
Menezes, A.2
Vanstone, S.3
-
19
-
-
57449086537
-
Secure vehicular communication systems: Implementation, performance, and research challenges
-
F. Kargl, P. Papadimitratos, L. Buttyan, M. Muter, E. Schoch, B. Wiedersheim, T.-V. Thong, G. Calandriello, A. Held, and A. Kung, "Secure vehicular communication systems: implementation, performance, and research challenges," Communications Magazine, IEEE, vol. 46, no. 11, pp. 110-118, 2008.
-
(2008)
Communications Magazine IEEE
, vol.46
, Issue.11
, pp. 110-118
-
-
Kargl, F.1
Papadimitratos, P.2
Buttyan, L.3
Muter, M.4
Schoch, E.5
Wiedersheim, B.6
Thong, T.-V.7
Calandriello, G.8
Held, A.9
Kung, A.10
-
20
-
-
84885074292
-
Performance analysis of accumulator-based revocation mechanisms
-
Springer
-
J. Lapon, M. Kohlweiss, B. De Decker, and V. Naessens, "Performance analysis of accumulator-based revocation mechanisms," in Security and Privacy-Silver Linings in the Cloud. Springer, 2010, pp. 289-301.
-
(2010)
Security and Privacy-Silver Linings in the Cloud
, pp. 289-301
-
-
Lapon, J.1
Kohlweiss, M.2
De Decker, B.3
Naessens, V.4
-
21
-
-
57449105235
-
Secure vehicular communication systems: Design and architecture
-
P. Papadimitratos, L. Buttyan, T. Holczer, E. Schoch, J. Freudiger, M. Raya, Z. Ma, F. Kargl, A. Kung, and J.-P. Hubaux, "Secure vehicular communication systems: design and architecture," Communications Magazine, IEEE, vol. 46, no. 11, pp. 100-109, 2008.
-
(2008)
Communications Magazine IEEE
, vol.46
, Issue.11
, pp. 100-109
-
-
Papadimitratos, P.1
Buttyan, L.2
Holczer, T.3
Schoch, E.4
Freudiger, J.5
Raya, M.6
Ma, Z.7
Kargl, F.8
Kung, A.9
Hubaux, J.-P.10
-
22
-
-
70350785887
-
Report on the secure vehicular communications: Results and challenges ahead workshop
-
P. Papadimitratos and J.-P. Hubaux, "Report on the secure vehicular communications: results and challenges ahead workshop," ACM SIGMOBILE Mobile Computing and Communications Review, vol. 12, no. 2, pp. 53-64, 2008.
-
(2008)
ACM SIGMOBILE Mobile Computing and Communications Review
, vol.12
, Issue.2
, pp. 53-64
-
-
Papadimitratos, P.1
Hubaux, J.-P.2
-
23
-
-
77955027183
-
V-tokens for conditional pseudonymity in VANETs
-
IEEE
-
F. Schaub, F. Kargl, Z. Ma, and M. Weber, "V-tokens for conditional pseudonymity in VANETs," in Wireless Communications and Networking Conference (WCNC), 2010 IEEE. IEEE, 2010, pp. 1-6.
-
(2010)
Wireless Communications and Networking Conference (WCNC), 2010 IEEE
, pp. 1-6
-
-
Schaub, F.1
Kargl, F.2
Ma, Z.3
Weber, M.4
-
24
-
-
70849118349
-
Privacy requirements in vehicular communication systems
-
F. Schaub, Z. Ma, and F. Kargl, "Privacy requirements in vehicular communication systems," in Computational Science and Engineering, 2009. CSE 09. International Conference on. IEEE, 2009, pp. 139-145.
-
(2009)
Computational Science and Engineering 2009. CSE 09. International Conference On. IEEE
, pp. 139-145
-
-
Schaub, F.1
Ma, Z.2
Kargl, F.3
-
25
-
-
84936879788
-
-
Masters thesis, University of Applied Sciences, Frankfurt am Main, Germany, Jun
-
A. Singh, "Restricted usage of anonymous credentials in VANET for misbehavior detection," Masters thesis, University of Applied Sciences, Frankfurt am Main, Germany, Jun. 2012.
-
(2012)
Restricted Usage of Anonymous Credentials in VANET for Misbehavior Detection
-
-
Singh, A.1
|