메뉴 건너뛰기




Volumn 2011, Issue 1, 2011, Pages

Secure protocols for data propagation and group communication in vehicular networks

Author keywords

elliptic curve; group communication; vehicle

Indexed keywords

CRYPTOGRAPHY; DIGITAL STORAGE; GEOMETRY; MOBILE TELECOMMUNICATION SYSTEMS; VEHICLE TO VEHICLE COMMUNICATIONS; VEHICLES;

EID: 84964292715     PISSN: 16871472     EISSN: 16871499     Source Type: Journal    
DOI: 10.1186/1687-1499-2011-167     Document Type: Article
Times cited : (9)

References (20)
  • 1
    • 78549283709 scopus 로고    scopus 로고
    • Elliptic curve cryptography
    • Kapoor V, Abraham VS, Singh R: Elliptic curve cryptography. Ubiquity 2008, 9(20):1-8.
    • (2008) Ubiquity , vol.9 , Issue.20 , pp. 1-8
    • Kapoor, V.1    Abraham, V.S.2    Singh, R.3
  • 2
    • 49949083706 scopus 로고    scopus 로고
    • Elliptic curve cryptography-based access control in sensor networks
    • Haodong W, Bo S, Quan L: Elliptic curve cryptography-based access control in sensor networks. Int J Security Netw 2006, 1(3):127-137. 10.1504/IJSN.2006.011772
    • (2006) Int J Security Netw , vol.1 , Issue.3 , pp. 127-137
    • Haodong, W.1    Bo, S.2    Quan, L.3
  • 4
    • 36749076982 scopus 로고    scopus 로고
    • GSIS: a secure and privacy-preserving protocol for vehicular communications
    • Lin X, Sun X, Ho P-H, Shen X: GSIS: a secure and privacy-preserving protocol for vehicular communications. IEEE Trans Veh Technol 2007, 56(6):3442-3456.
    • (2007) IEEE Trans Veh Technol , vol.56 , Issue.6 , pp. 3442-3456
    • Lin, X.1    Sun, X.2    Ho, P.-H.3    Shen, X.4
  • 8
    • 38449112781 scopus 로고    scopus 로고
    • Secure and scalable communication in vehicle ad hoc network
    • Nikodem J, Nikodem M: Secure and scalable communication in vehicle ad hoc network. Lecture Notes in Computer Science 2007, 4739/2007: 1167-1174.
    • (2007) Lecture Notes in Computer Science , vol.4739-2007 , pp. 1167-1174
    • Nikodem, J.1    Nikodem, M.2
  • 9
    • 77952252546 scopus 로고    scopus 로고
    • A scalable robust authentication protocol for secure vehicular communications
    • Lei Z, Qianhong W, Solanas A, Domingo-Ferrer J: A scalable robust authentication protocol for secure vehicular communications. IEEE Trans Veh Technol 2010, 59(4):1606-1617.
    • (2010) IEEE Trans Veh Technol , vol.59 , Issue.4 , pp. 1606-1617
    • Lei, Z.1    Qianhong, W.2    Solanas, A.3    Domingo-Ferrer, J.4
  • 10
    • 62949096969 scopus 로고    scopus 로고
    • Routing in vehicular networks: feasibility, modeling, and security
    • Article ID 267513
    • Broustis I, Faloutsos M: Routing in vehicular networks: feasibility, modeling, and security. Int J Veh Technol 2008, 8. Article ID 267513
    • (2008) Int J Veh Technol , pp. 8
    • Broustis, I.1    Faloutsos, M.2
  • 11
    • 14944351780 scopus 로고    scopus 로고
    • Wu H, Fujimoto R, Guensler R, Hunter M: MDDV: a mobility-centric data dissemination algorithm for vehicular networks. Proceedings of the 1st ACM International Workshop on Vehicular Ad Hoc Networks (VANET '04) 47-56
    • Wu H, Fujimoto R, Guensler R, Hunter M: MDDV: a mobility-centric data dissemination algorithm for vehicular networks. Proceedings of the 1st ACM International Workshop on Vehicular Ad Hoc Networks (VANET '04) 47-56.
  • 15
    • 58149108946 scopus 로고    scopus 로고
    • An efficient mobile authentication scheme for wireless networks
    • Tang C, Wu DO: An efficient mobile authentication scheme for wireless networks. IEEE Trans Wirel Commun 2008, 7(4):1408-1416.
    • (2008) IEEE Trans Wirel Commun , vol.7 , Issue.4 , pp. 1408-1416
    • Tang, C.1    Wu, D.O.2
  • 16
    • 79251609501 scopus 로고    scopus 로고
    • Secure and efficient protocol for vehicular ad hoc network with privacy preservation
    • Article ID 716794
    • Choi H-K, Kim I-H, Yoo J-C: Secure and efficient protocol for vehicular ad hoc network with privacy preservation. EURASIP J Wirel Commun Netw 2011, 15. Article ID 716794
    • (2011) EURASIP J Wirel Commun Netw , pp. 15
    • Choi, H.-K.1    Kim, I.-H.2    Yoo, J.-C.3
  • 17
    • 84875997854 scopus 로고    scopus 로고
    • Implementation of elliptic curve digital signature algorithm
    • Khalique A, Singh K, Sood S: Implementation of elliptic curve digital signature algorithm. Int J Comput Appl 2010, 2(2):21-27.
    • (2010) Int J Comput Appl , vol.2 , Issue.2 , pp. 21-27
    • Khalique, A.1    Singh, K.2    Sood, S.3
  • 19
    • 68949105568 scopus 로고    scopus 로고
    • Probabilistic localization and tracking of malicious insiders using hyperbolic position bounding in vehicular networks
    • Article ID 128679
    • Laurendeau C, Barbeau M: Probabilistic localization and tracking of malicious insiders using hyperbolic position bounding in vehicular networks. EURASIP J Wirel Commun Netw 2009, 13. Article ID 128679
    • (2009) EURASIP J Wirel Commun Netw , pp. 13
    • Laurendeau, C.1    Barbeau, M.2
  • 20
    • 84964306422 scopus 로고    scopus 로고
    • GoogleMap APIs[]
    • GoogleMap APIs[http://code.google.com/intl/zh-TW/apis/maps/index.html]


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.