-
1
-
-
85030372293
-
-
Car 2 Car Communication Consortium. http://www.car-to-car.org/.
-
-
-
-
6
-
-
0033731024
-
Design, implementation, and deployment of the iKP secure electronic payment system
-
M. Bellare, J. Garay, R. Hauser, A. Herzberg, H. Krawczyk, M. Steiner, G. Tsudik, E.V. Herreweghen, M. Waidner, Design, implementation, and deployment of the iKP secure electronic payment system, IEEE J. Sel. Areas Commun. 18 (4) (2000) 611-627.
-
(2000)
IEEE J. Sel. Areas Commun.
, vol.18
, Issue.4
, pp. 611-627
-
-
Bellare, M.1
Garay, J.2
Hauser, R.3
Herzberg, A.4
Krawczyk, H.5
Steiner, M.6
Tsudik, G.7
Herreweghen, E.V.8
Waidner, M.9
-
7
-
-
50849114523
-
Fast batch verification for modular exponentiation and digital signatures
-
M. Bellare, J. Garay, T. Rabin, Fast batch verification for modular exponentiation and digital signatures, in: Proceedings of Advances in Cryptology-EUROCRYPT 1998, Lecture Notes in Computer Science, 1403, 1998, pp. 236-250.
-
(1998)
Proceedings of Advances in Cryptology-EUROCRYPT 1998, Lecture Notes in Computer Science
, vol.1403
, pp. 236-250
-
-
Bellare, M.1
Garay, J.2
Rabin, T.3
-
8
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
D. Boneh, M. Franklin, Identity-based encryption from the weil pairing, in: Proceedings of Advances in Cryptology-CRYPTO 2001, Lecture Notes in Computer Science, 2139, 2001, pp. 213-229.
-
(2001)
Proceedings of Advances in Cryptology-CRYPTO 2001, Lecture Notes in Computer Science
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
9
-
-
84946840347
-
Short signatures from the weil pairing
-
D. Boneh, B. Lynn, H. Shacham, Short signatures from the weil pairing, in: Proceedings of Asiacrypt 2001, Lecture Notes in Computer Science, 2248, 2001, pp. 514-532.
-
(2001)
Proceedings of Asiacrypt 2001, Lecture Notes in Computer Science
, vol.2248
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
12
-
-
85024290278
-
Group signatures
-
D. Chaum, E. van Heijst, Group signatures, in: Proceedings of Advances in Cryptology-Eurocrypt 1991, Lecture Notes in Computer Science, 576, 1991, pp. 257-265.
-
(1991)
Proceedings of Advances in Cryptology-Eurocrypt 1991, Lecture Notes in Computer Science
, vol.576
, pp. 257-265
-
-
Chaum, D.1
Van Heijst, E.2
-
13
-
-
84898790286
-
Vanet security surveys
-
R. Engoulou, M. Bellaïche, S. Pierre, A. Quintero, Vanet security surveys, Comput. Commun. 44 (2014) 1-13.
-
(2014)
Comput. Commun.
, vol.44
, pp. 1-13
-
-
Engoulou, R.1
Bellaïche, M.2
Pierre, S.3
Quintero, A.4
-
14
-
-
84968502759
-
A remark concerning m-divisibility and the discrete logarithm in the divisor class group of curves
-
G. Frey, H.-G. Rück, A remark concerning m-divisibility and the discrete logarithm in the divisor class group of curves, Math. Comput. 62 (206) (1994) pp.865-874.
-
(1994)
Math. Comput
, vol.62
, Issue.206
, pp. 865-874
-
-
Frey, G.1
Rück, H.-G.2
-
16
-
-
33846452379
-
The eta pairing revisited
-
F. Hess, N.P. Smart, F. Vercauteren, The eta pairing revisited, IEEE Trans. Inf. Theory 52 (10) (2006) 4595-4602.
-
(2006)
IEEE Trans. Inf. Theory
, vol.52
, Issue.10
, pp. 4595-4602
-
-
Hess, F.1
Smart, N.P.2
Vercauteren, F.3
-
17
-
-
78751657441
-
Abaka: An anonymous batch authenticated and key agreement scheme for value-added services in vehicular ad hoc networks
-
J. Huang, L. Yeh, H. Chien, Abaka: an anonymous batch authenticated and key agreement scheme for value-added services in vehicular ad hoc networks, IEEE Trans. Vehicular Technol. 60 (1) (2011) 248-262.
-
(2011)
IEEE Trans. Vehicular Technol.
, vol.60
, Issue.1
, pp. 248-262
-
-
Huang, J.1
Yeh, L.2
Chien, H.3
-
18
-
-
3042594839
-
The security and privacy of smart vehicles
-
J. Hubaux, S. ɤapkun, J. Luo, The security and privacy of smart vehicles, IEEE Secur. Priv. 2 (3) (2004) pp.49-55.
-
(2004)
IEEE Secur. Priv.
, vol.2
, Issue.3
, pp. 49-55
-
-
Hubaux, J.1
ɤapkun, S.2
Luo, J.3
-
19
-
-
84943632039
-
Timing attacks on implementations of Diffie-Hellman, rsa, dss, and other systems
-
P. Kocher, Timing attacks on implementations of Diffie-Hellman, rsa, dss, and other systems, in: Proceedings of Advances in Cryptology-CRYPTO 1996, Lecture Notes in Computer Science, 1109, 1996, pp. 104-113.
-
(1996)
Proceedings of Advances in Cryptology-CRYPTO 1996, Lecture Notes in Computer Science
, vol.1109
, pp. 104-113
-
-
Kocher, P.1
-
20
-
-
36749076982
-
Gsis: A secure and privacy preserving protocol for vehicular communications
-
X. Lin, X. Sun, P. Ho, X. Shen, Gsis: A secure and privacy preserving protocol for vehicular communications, IEEE Trans. Vehicular Technol. 56 (6) (2007) 3442-3456.
-
(2007)
IEEE Trans. Vehicular Technol.
, vol.56
, Issue.6
, pp. 3442-3456
-
-
Lin, X.1
Sun, X.2
Ho, P.3
Shen, X.4
-
22
-
-
0027662341
-
Reducing elliptic curves logarithms to logarithms in a finite field
-
A. Menezes, T. Okamoto, S.A. Vanstone, Reducing elliptic curves logarithms to logarithms in a finite field, IEEE Trans. Inf. Theory 39 (5) (1993) 1639-1646.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.5
, pp. 1639-1646
-
-
Menezes, A.1
Okamoto, T.2
Vanstone, S.A.3
-
23
-
-
33646771737
-
Verifier-local revocation group signature schemes with backward unlinkability from bilinear maps
-
T. Nakanishi, N. Funabiki, Verifier-local revocation group signature schemes with backward unlinkability from bilinear maps, in: Proceedings of Advances in Cryptology - ASIACRYPT 2005, Lecture Notes in Computer Science, 3788, 2005, pp. 533-548.
-
(2005)
Proceedings of Advances in Cryptology - ASIACRYPT 2005, Lecture Notes in Computer Science
, vol.3788
, pp. 533-548
-
-
Nakanishi, T.1
Funabiki, N.2
-
24
-
-
37149046758
-
Securing vehicular communications - Assumptions, requirements, and principles
-
P. Papadimitratos, V. Gligor, J. Hubaux, Securing vehicular communications - assumptions, requirements, and principles, in: Proceedings of Workshop on Embedded Security in Cars (ESCAR) 2006, 2006.
-
(2006)
Proceedings of Workshop on Embedded Security in Cars (ESCAR) 2006
-
-
Papadimitratos, P.1
Gligor, V.2
Hubaux, J.3
-
25
-
-
84905103355
-
Security in wireless ad-hoc networks - A survey
-
R. DiPietro, S. Guarino, N. Verde, J. Domingo-Ferrer, Security in wireless ad-hoc networks - a survey, Comput. Commun. 51 (2014) 1-20.
-
(2014)
Comput. Commun.
, vol.51
, pp. 1-20
-
-
DiPietro, R.1
Guarino, S.2
Verde, N.3
Domingo-Ferrer, J.4
-
28
-
-
33845726678
-
Securing vehicular ad hoc networks
-
M. Raya, J. Hubaux, Securing vehicular ad hoc networks, J. Comput. Secur. 15 (1) (2007) pp.39-68.
-
(2007)
J. Comput. Secur
, vol.15
, Issue.1
, pp. 39-68
-
-
Raya, M.1
Hubaux, J.2
-
29
-
-
35349016950
-
Amoeba: Robust location privacy scheme for vanet
-
K. Sampigethaya, M. Li, L. Huang, R. Poovendran, Amoeba: robust location privacy scheme for vanet, IEEE J. Sel. Areas Commun. 25 (8) (2007) 1569-1589.
-
(2007)
IEEE J. Sel. Areas Commun.
, vol.25
, Issue.8
, pp. 1569-1589
-
-
Sampigethaya, K.1
Li, M.2
Huang, L.3
Poovendran, R.4
-
30
-
-
85020598353
-
Identity based cryptosystems and signature schemes
-
A. Shamir, Identity based cryptosystems and signature schemes, in: Proceedings of Advances in Cryptology-CRYPTO 1984, Lecture Notes in Computer Science, 196, 1984, pp. 47-53.
-
(1984)
Proceedings of Advances in Cryptology-CRYPTO 1984, Lecture Notes in Computer Science
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
31
-
-
67650694228
-
A unified framework for the analysis of side-channel key recovery attacks
-
F. Standaert, T. Malkin, M. Yung, A unified framework for the analysis of side-channel key recovery attacks, in: Proceedings of Advances in Cryptology-Eurocrypt 2009, Lecture Notes in Computer Science, 5479, 2009, pp. 443-461.
-
(2009)
Proceedings of Advances in Cryptology-Eurocrypt 2009, Lecture Notes in Computer Science
, vol.5479
, pp. 443-461
-
-
Standaert, F.1
Malkin, T.2
Yung, M.3
-
32
-
-
84863354250
-
On the security of an anonymous batch authenticated and key agreement scheme for value-added services in vanets
-
H. Wang, Y. Zhang, On the security of an anonymous batch authenticated and key agreement scheme for value-added services in vanets, Procedia Eng. 29 (2012) 1735-1739.
-
(2012)
Procedia Eng.
, vol.29
, pp. 1735-1739
-
-
Wang, H.1
Zhang, Y.2
-
33
-
-
77955389744
-
Secure data downloading with privacy preservation in vehicular ad hoc networks
-
H. Yong, T. Jin, C. Yu, Z. Chi, Secure data downloading with privacy preservation in vehicular ad hoc networks, in: Proceedings of IEEE International Conference on Communications 2010, 2010, pp. 1-5.
-
(2010)
Proceedings of IEEE International Conference on Communications 2010
, pp. 1-5
-
-
Yong, H.1
Jin, T.2
Yu, C.3
Chi, Z.4
-
34
-
-
32144446861
-
Security issues in a future vehicular network
-
February
-
M. Zarki, S. Mehrotra, G. Tsudik, N. Venkatasubramanian, Security issues in a future vehicular network, in: Proceedings of the European Wireless Workshop, February 2002.
-
(2002)
Proceedings of the European Wireless Workshop
-
-
Zarki, M.1
Mehrotra, S.2
Tsudik, G.3
Venkatasubramanian, N.4
-
35
-
-
51449098979
-
An efficient identity-based batch verification scheme for vehicular sensor networks
-
C. Zhang, R. Lu, X. Lin, P. Ho, X. Shen, An efficient identity-based batch verification scheme for vehicular sensor networks, in: Proceedings of IEEE INFOCOM 2008, 2008, pp. 246-250.
-
(2008)
Proceedings of IEEE INFOCOM 2008
, pp. 246-250
-
-
Zhang, C.1
Lu, R.2
Lin, X.3
Ho, P.4
Shen, X.5
-
36
-
-
77249157951
-
Balanced trustworthiness, safety and privacy in vehicle-to-vehicle communications
-
Q. Wu, J. Domingo-Ferrer, U. González-Nicolás, Balanced trustworthiness, safety and privacy in vehicle-to-vehicle communications, IEEE Trans. Vehicular Technol. 59 (2) (2010) 559-573.
-
(2010)
IEEE Trans. Vehicular Technol.
, vol.59
, Issue.2
, pp. 559-573
-
-
Wu, Q.1
Domingo-Ferrer, J.2
González-Nicolás, U.3
-
37
-
-
77952252546
-
A scalable robust authentication protocol for secure vehicular communications
-
L. Zhang, Q. Wu, A. Solanas, J. Domingo-Ferrer, A scalable robust authentication protocol for secure vehicular communications, IEEE Trans. Vehicular Technol. 59 (4) (2010) 1606-1617.
-
(2010)
IEEE Trans. Vehicular Technol.
, vol.59
, Issue.4
, pp. 1606-1617
-
-
Zhang, L.1
Wu, Q.2
Solanas, A.3
Domingo-Ferrer, J.4
-
38
-
-
79960186888
-
Provably secure one-round identity-based authenticated asymmetric group key agreement protocol
-
L. Zhang, Q. Wu, B. Qin, J. Domingo-Ferrer, Provably secure one-round identity-based authenticated asymmetric group key agreement protocol, Inf. Sci. 181 (19) (2011) 4318-4329.
-
(2011)
Inf. Sci.
, vol.181
, Issue.19
, pp. 4318-4329
-
-
Zhang, L.1
Wu, Q.2
Qin, B.3
Domingo-Ferrer, J.4
-
39
-
-
84975035576
-
-
L. Zhang, Q. Wu, B. Qin, J. Domingo-Ferrer, Practical privacy for value-added applications in vehicular ad hoc networks 7646 (2012) 43-56.
-
(2012)
Practical Privacy for Value-added Applications in Vehicular Ad Hoc Networks
, vol.7646
, pp. 43-56
-
-
Zhang, L.1
Wu, Q.2
Qin, B.3
Domingo-Ferrer, J.4
|