-
1
-
-
33845726678
-
Securing vehicular ad hoc networks
-
Jan.
-
M. Raya and J. P. Hubaux, "Securing vehicular ad hoc networks," J. Comput. Security, vol. 15, no. 1, pp. 39-68, Jan. 2007.
-
(2007)
J. Comput. Security
, vol.15
, Issue.1
, pp. 39-68
-
-
Raya, M.1
Hubaux, J.P.2
-
2
-
-
84892424414
-
VSPN: VANET-based secure and privacy-preserving navigation
-
Feb.
-
T. W. Chim, S. M. Yiu, C. K. Hui, and O. K. Li, "VSPN: VANET-based secure and privacy-preserving navigation," IEEE Trans. Comput., vol. 63, no. 2, pp. 510-524, Feb. 2014.
-
(2014)
IEEE Trans. Comput.
, vol.63
, Issue.2
, pp. 510-524
-
-
Chim, T.W.1
Yiu, S.M.2
Hui, C.K.3
Li, O.K.4
-
3
-
-
77956926901
-
Security attacks and solutions for vehicular ad hoc networks
-
Apr.
-
J. T. Isaac, S. Zeadally, and J. S. Camara, "Security attacks and solutions for vehicular ad hoc networks," IET Commun., vol. 4, no. 7, pp. 894-903, Apr. 2010.
-
(2010)
IET Commun.
, vol.4
, Issue.7
, pp. 894-903
-
-
Isaac, J.T.1
Zeadally, S.2
Camara, J.S.3
-
4
-
-
84870443892
-
Vehicular ad hoc networks (VANETS): Status, results, challenges
-
Aug.
-
S. Zeadally, R. Hunt, Y. S. Chen, A. Irwin, and A. Hassan, "Vehicular ad hoc networks (VANETS): Status, results, challenges," Telecommun. Syst., vol. 50, no. 4, pp. 217-241, Aug. 2012.
-
(2012)
Telecommun. Syst.
, vol.50
, Issue.4
, pp. 217-241
-
-
Zeadally, S.1
Hunt, R.2
Chen, Y.S.3
Irwin, A.4
Hassan, A.5
-
5
-
-
74549134073
-
Flexible, extensible, efficient VANET authentication
-
Dec.
-
A. Studer, F. Bai, B. Bellur, and A. Perrig, "Flexible, extensible, efficient VANET authentication," J. Commun. Netw., vol. 11, no. 6, pp. 574-588, Dec. 2009.
-
(2009)
J. Commun. Netw.
, vol.11
, Issue.6
, pp. 574-588
-
-
Studer, A.1
Bai, F.2
Bellur, B.3
Perrig, A.4
-
6
-
-
57049129831
-
An efficient message authentication scheme for vehicular communications
-
Nov.
-
C. Zhang, X. Lin, R. Lu, P. Ho, and X. Shen, "An efficient message authentication scheme for vehicular communications," IEEE Trans. Veh. Technol., vol. 57, no. 6, pp. 3357-3368, Nov. 2008.
-
(2008)
IEEE Trans. Veh. Technol.
, vol.57
, Issue.6
, pp. 3357-3368
-
-
Zhang, C.1
Lin, X.2
Lu, R.3
Ho, P.4
Shen, X.5
-
7
-
-
51449098979
-
An efficient identity-based batch verification scheme for vehicular sensor networks
-
C. Zhang, R. Lu, X. Lin, P. Ho, and X. Shen, "An efficient identity-based batch verification scheme for vehicular sensor networks," in Proc. IEEE INFOCOM, 2008, pp. 246-250.
-
(2008)
Proc. IEEE INFOCOM
, pp. 246-250
-
-
Zhang, C.1
Lu, R.2
Lin, X.3
Ho, P.4
Shen, X.5
-
8
-
-
84939459513
-
-
Dedicated Short Range Commun. (DSRC)
-
Dedicated Short Range Commun. (DSRC). [Online]. Available: http:// standards.ieee.org/develop/wg/1609-WG.html
-
-
-
-
10
-
-
78751657441
-
ABAKA: An anonymous batch authenticated and key agreement scheme for value-added services in vehicular ad hoc networks
-
Jan.
-
J. L. Huang, L. Y. Yeh, and H. Y. Chien, "ABAKA: An anonymous batch authenticated and key agreement scheme for value-added services in vehicular ad hoc networks," IEEE Trans. Veh. Technol., vol. 60, no. 1, pp. 248-262, Jan. 2011.
-
(2011)
IEEE Trans. Veh. Technol.
, vol.60
, Issue.1
, pp. 248-262
-
-
Huang, J.L.1
Yeh, L.Y.2
Chien, H.Y.3
-
11
-
-
84887266426
-
B-SPECS+: Batch verification for secure pseudonymous authentication in VANET
-
Nov.
-
S. J. Horng et al., "b-SPECS+: Batch verification for secure pseudonymous authentication in VANET," IEEE Trans. Inf. Forensics Security, vol. 8, no. 11, pp. 1860-1875, Nov. 2013.
-
(2010)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.11
, pp. 1860-1875
-
-
Horng, S.J.1
-
12
-
-
84861148363
-
CPAS: An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks
-
May
-
K. A. Shim, "CPAS: An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks," IEEE Trans. Veh. Technol., vol. 61, no. 4, pp. 1874-1883, May 2012.
-
(2012)
IEEE Trans. Veh. Technol.
, vol.61
, Issue.4
, pp. 1874-1883
-
-
Shim, K.A.1
-
13
-
-
84868122743
-
A rapid certification protocol from bilinear pairing for vehicular ad hoc networks
-
X. Li and L. Wang, "A rapid certification protocol from bilinear pairing for vehicular ad hoc networks," in Proc. IEEE Conf. TrustCOM, 2012, pp. 890-895.
-
(2012)
Proc. IEEE Conf. TrustCOM
, pp. 890-895
-
-
Li, X.1
Wang, L.2
-
14
-
-
0142002511
-
The elliptic curve digital signature algorithm (ECDSA)
-
Aug.
-
D. Johnson and A. Menezes, "The elliptic curve digital signature algorithm (ECDSA)," Int. J. Inf. Security, vol. 1, no. 1, pp. 36-63, Aug. 2001.
-
(2001)
Int. J. Inf. Security
, vol.1
, Issue.1
, pp. 36-63
-
-
Johnson, D.1
Menezes, A.2
-
15
-
-
77949831002
-
Analysis of ECDSA authentication processing in VANETs
-
J. Petit, "Analysis of ECDSA authentication processing in VANETs," in Proc. IEEE Conf. NTMS, 2009, vol. 1, pp. 1-5.
-
(2009)
Proc. IEEE Conf. NTMS
, vol.1
, pp. 1-5
-
-
Petit, J.1
-
16
-
-
15744368857
-
Efficient and secure source authentication for multicast
-
A. Perring, R. Canetti, D. Song, and D. Tygar, "Efficient and secure source authentication for multicast," in Proc. NDSS, 2001, pp. 35-46.
-
(2001)
Proc. NDSS
, pp. 35-46
-
-
Perring, A.1
Canetti, R.2
Song, D.3
Tygar, D.4
-
17
-
-
84874324906
-
-
New York, NY, USA: Springer-Verlag
-
D. Boneh and M. Franklin, Identity-Based Encryption from the Weil Pairing. New York, NY, USA: Springer-Verlag, 2001, pp. 213-229.
-
(2001)
Identity-Based Encryption from the Weil Pairing
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
18
-
-
33646238348
-
Batch verification with ID-based signatures
-
H. Yoon, J. H. Cheon, and Y. Kim, "Batch verification with ID-based signatures," in Proc. Inform. Security Cryptology, 2004, pp. 233-248.
-
(2004)
Proc. Inform. Security Cryptology
, pp. 233-248
-
-
Yoon, H.1
Cheon, J.H.2
Kim, Y.3
-
19
-
-
84855615935
-
On batch verification with group testing for vehicular communications
-
Nov.
-
C. Zhang, P. Ho, and J. Tapolcai, "On batch verification with group testing for vehicular communications," Wireless Netw., vol. 17, no. 8, pp. 1851-1865, Nov. 2011.
-
(2011)
Wireless Netw.
, vol.17
, Issue.8
, pp. 1851-1865
-
-
Zhang, C.1
Ho, P.2
Tapolcai, J.3
-
20
-
-
77957259997
-
SPECS: Secure and privacy enhancing communications schemes for VANETs
-
T. W. Chim, S. M. Yiu, C. K. Hui, and O. K. Li, "SPECS: Secure and privacy enhancing communications schemes for VANETs," Ad Hoc Netw., vol. 12, pp. 189-203, 2011.
-
(2011)
Ad Hoc Netw.
, vol.12
, pp. 189-203
-
-
Chim, T.W.1
Yiu, S.M.2
Hui, C.K.3
Li, O.K.4
-
21
-
-
77958084781
-
Complementing public key infrastructure to secure vehicular ad hoc networks [Security and Privacy in Emerging Wireless Networks]
-
Oct.
-
A. Wasef, R. Lu, X. Lin, and X. Shen, "Complementing public key infrastructure to secure vehicular ad hoc networks [Security and Privacy in Emerging Wireless Networks]," IEEE Wireless Commun., vol. 17, no. 5, pp. 22-28, Oct. 2010.
-
(2010)
IEEE Wireless Commun.
, vol.17
, Issue.5
, pp. 22-28
-
-
Wasef, A.1
Lu, R.2
Lin, X.3
Shen, X.4
-
22
-
-
69949166012
-
Identity-based encryption with efficient revocation
-
A. Boldyreva, V. Goyal, and V. Kumar, "Identity-based encryption with efficient revocation," in Proc. ACM Conf. Comput. Commun. Security, 2008, pp. 417-426.
-
(2008)
Proc. ACM Conf. Comput. Commun. Security
, pp. 417-426
-
-
Boldyreva, A.1
Goyal, V.2
Kumar, V.3
-
23
-
-
70450180562
-
EDR: Efficient decentralized revocation protocol for vehicular ad hoc networks
-
Nov.
-
A. Wasef and X. Shen, "EDR: Efficient decentralized revocation protocol for vehicular ad hoc networks," IEEE Trans. Veh. Technol., vol. 58, no. 9, pp. 5214-5224, Nov. 2009.
-
(2009)
IEEE Trans. Veh. Technol.
, vol.58
, Issue.9
, pp. 5214-5224
-
-
Wasef, A.1
Shen, X.2
-
24
-
-
77249177167
-
DCS: An efficient distributedcertificate-service scheme for vehicular networks
-
Feb.
-
A. Wasef, Y. Jiang, and X. Shen, "DCS: An efficient distributedcertificate-service scheme for vehicular networks," IEEE Trans. Veh. Technol., vol. 59, no. 2, pp. 533-549, Feb. 2010.
-
(2010)
IEEE Trans. Veh. Technol.
, vol.59
, Issue.2
, pp. 533-549
-
-
Wasef, A.1
Jiang, Y.2
Shen, X.3
-
25
-
-
84870429369
-
EMAP: Expedite message authentication protocol for vehicular ad hoc networks
-
Jan.
-
A.Wasef and X. Shen, "EMAP: Expedite message authentication protocol for vehicular ad hoc networks," IEEE Trans. Mobile Comput., vol. 12, no. 1, pp. 78-89, Jan. 2013.
-
(2010)
IEEE Trans. Mobile Comput.
, vol.12
, Issue.1
, pp. 78-89
-
-
Wasef, A.1
Shen, X.2
-
26
-
-
84856182115
-
Pseudonym changing at social spots: An effective strategy for location privacy in VANETs
-
Jan.
-
R. Lu, X. Lin, and H. Luan, "Pseudonym changing at social spots: An effective strategy for location privacy in VANETs," IEEE Trans. Veh. Technol., vol. 61, no. 1, pp. 86-96, Jan. 2012.
-
(2012)
IEEE Trans. Veh. Technol.
, vol.61
, Issue.1
, pp. 86-96
-
-
Lu, R.1
Lin, X.2
Luan, H.3
-
27
-
-
77956735087
-
An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications
-
Sep.
-
Y. Sun, R. Lu, X. Lin, X. Shen, and J. Su, "An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications," IEEE Trans. Veh. Technol., vol. 59, no. 7, pp. 3589-3603, Sep. 2010.
-
(2010)
IEEE Trans. Veh. Technol.
, vol.59
, Issue.7
, pp. 3589-3603
-
-
Sun, Y.1
Lu, R.2
Lin, X.3
Shen, X.4
Su, J.5
-
28
-
-
63749115331
-
A security framework with strong non-repudiation and privacy in VANETs
-
J. Choi and S. Jung, "A security framework with strong non-repudiation and privacy in VANETs," in Proc. IEEE Conf. CCNC, 2009, pp. 1-5.
-
(2009)
Proc. IEEE Conf. CCNC
, pp. 1-5
-
-
Choi, J.1
Jung, S.2
-
29
-
-
84884179626
-
A lightweight conditional privacypreservation protocol for vehicular traffic-monitoring systems
-
May/Jun.
-
R. Lu, X. Lin, Z. Shi, and X. Shen, "A lightweight conditional privacypreservation protocol for vehicular traffic-monitoring systems," IEEE Intell. Syst., vol. 28, no. 3, pp. 62-65, May/Jun. 2013.
-
(2010)
IEEE Intell. Syst.
, vol.28
, Issue.3
, pp. 62-65
-
-
Lu, R.1
Lin, X.2
Shi, Z.3
Shen, X.4
-
30
-
-
84896875258
-
Efficient privacy-preserving authentication for vehicular ad hoc networks
-
Feb.
-
X. Zhu, S. Jiang, L. Wang, and H. Li, "Efficient privacy-preserving authentication for vehicular ad hoc networks," IEEE Trans. Veh. Technol., vol. 63, no. 2, pp. 907-919, Feb. 2014.
-
(2014)
IEEE Trans. Veh. Technol.
, vol.63
, Issue.2
, pp. 907-919
-
-
Zhu, X.1
Jiang, S.2
Wang, L.3
Li, H.4
-
31
-
-
67249143973
-
A secure VANET MAC protocol for DSRC applications
-
Y. Qian, K. Lu, and N. Moayeri, "A secure VANET MAC protocol for DSRC applications," in Proc. IEEE GLOBECOM, 2008, pp. 1-5.
-
(2008)
Proc. IEEE GLOBECOM
, pp. 1-5
-
-
Qian, Y.1
Lu, K.2
Moayeri, N.3
-
32
-
-
78650369686
-
Security analysis of vehicular ad hoc networks (VANET)
-
G. Samara, W. A. H. A. Salihy, and R. Sures, "Security analysis of vehicular ad hoc networks (VANET)," in Proc. IEEE Conf. NETAPPS, 2010, pp. 55-60.
-
Proc. IEEE Conf. NETAPPS
, vol.2010
, pp. 55-60
-
-
Samara, G.1
Salihy, W.A.H.A.2
Sures, R.3
-
33
-
-
70350785887
-
Report on the "secure vehicular communications: Results and challenges ahead" workshop"
-
P. Papadimitratos and J. P. Hubaux, "Report on the "secure vehicular communications: Results and challenges ahead" workshop," ACM SIGMOBILE Mobile Comput. Commun. Rev., vol. 12, no. 2, 2008.
-
(2008)
ACM SIGMOBILE Mobile Comput. Commun. Rev.
, vol.12
, Issue.2
-
-
Papadimitratos, P.1
Hubaux, J.P.2
-
34
-
-
51349155690
-
On data-centric trust establishment in ephemeral ad hoc networks
-
M. Raya, P. Papadimitratos, V. D. Gligory, and J. P. Hubaux, "On data-centric trust establishment in ephemeral ad hoc networks," in Proc. IEEE Annu. Joint Conf. Comput. Commun. Soc., 2008, pp. 1238-1246.
-
(2008)
Proc. IEEE Annu. Joint Conf. Comput. Commun. Soc.
, pp. 1238-1246
-
-
Raya, M.1
Papadimitratos, P.2
Gligory, V.D.3
Hubaux, J.P.4
-
35
-
-
84877842588
-
Graph-based metrics for insider attack detection in VANET multihop data dissemination protocols
-
May
-
S. Dietzel, J. Petit, G. Heijenk, and F. Kargl, "Graph-based metrics for insider attack detection in VANET multihop data dissemination protocols," IEEE Trans. Veh. Technol., vol. 62, no. 4, pp. 1505-1518, May 2013.
-
(2013)
IEEE Trans. Veh. Technol.
, vol.62
, Issue.4
, pp. 1505-1518
-
-
Dietzel, S.1
Petit, J.2
Heijenk, G.3
Kargl, F.4
-
36
-
-
84898790286
-
VANET security surveys
-
May
-
R. G. Engoulou, M. Bellaiche, S. Pierre, and A. Quintero, "VANET security surveys," Comput. Commun., vol. 44, pp. 1-3, May 2014.
-
(2014)
Comput. Commun.
, vol.44
, pp. 1-3
-
-
Engoulou, R.G.1
Bellaiche, M.2
Pierre, S.3
Quintero, A.4
-
37
-
-
47749095986
-
Design of secure and application-oriented VANETs
-
Y. Qian and N. Moayeri, "Design of secure and application-oriented VANETs," in Proc. IEEE VTC Spring 2008, 2008, pp. 2794-2799.
-
(2008)
Proc. IEEE VTC Spring 2008
, pp. 2794-2799
-
-
Qian, Y.1
Moayeri, N.2
-
38
-
-
84884387687
-
Achieving efficient cooperative message authentication in vehicular ad hoc networks
-
Sep.
-
X. Lin and X. Li, "Achieving efficient cooperative message authentication in vehicular ad hoc networks," IEEE Trans. Veh. Technol., vol. 62, pp. 3339-3348, Sep. 2013.
-
(2013)
IEEE Trans. Veh. Technol.
, vol.62
, pp. 3339-3348
-
-
Lin, X.1
Li, X.2
-
39
-
-
84939433021
-
-
The Network Simulator NS-2. [Online]
-
The Network Simulator NS-2. [Online]. Available: http://www.isi.edu/ nsnam/ns
-
-
-
-
40
-
-
84939453613
-
-
VanetMobiSim Project Home Page
-
VanetMobiSim Project Home Page. [Online]. Available: http://vanet. eurecom.fr
-
-
-
|