-
1
-
-
84978635381
-
-
IEEE 802.11P. [Online]. Available Oct.
-
IEEE 802.11P. [Online]. Available: http://www.ieee802.org/11/Reports/tgpupdate.htm, Oct. 2015.
-
(2015)
-
-
-
2
-
-
84978780695
-
-
The Network Simulator-ns. [Online]. Available Oct.
-
The Network Simulator-ns. [Online]. Available: http://www.isi. edu/nsnam/ns/, Oct. 2015.
-
(2015)
-
-
-
3
-
-
84978635387
-
-
VanetMobiSim. [Online]. Available Oct.
-
VanetMobiSim. [Online]. Available: http://vanet.eurecom.fr/, Oct. 2015.
-
(2015)
-
-
-
5
-
-
78650874822
-
TimeRemap: Stable and accurate time in vehicular networks
-
Dec.
-
R. Ben-El-Kezadri and G. Pau, "TimeRemap: Stable and accurate time in vehicular networks, " IEEE Commun. Mag., vol. 48, no. 12, pp. 52-57, Dec. 2010.
-
(2010)
IEEE Commun. Mag.
, vol.48
, Issue.12
, pp. 52-57
-
-
Ben-El-Kezadri, R.1
Pau, G.2
-
8
-
-
35248835575
-
Aggregate and verifiably encrypted signatures from bilinear maps
-
D. Boneh, C. Gentry, B. Lynn and H. Shacham, "Aggregate and verifiably encrypted signatures from bilinear maps, " in Proc. 22nd Int. Conf. Theory Appl. Cryptographic Tech., 2003, pp. 416-432.
-
(2003)
Proc. 22nd Int. Conf. Theory Appl. Cryptographic Tech.
, pp. 416-432
-
-
Boneh, D.1
Gentry, C.2
Lynn, B.3
Shacham, H.4
-
12
-
-
84892424414
-
VSPN: VANET-based secure and privacy-preserving navigation
-
Feb.
-
T. Chim, S. Yiu, L. Hui and V. Li, "VSPN: VANET-based secure and privacy-preserving navigation, " IEEE Trans. Comput., vol. 63, no. 2, pp. 510-524, Feb. 2014.
-
(2014)
IEEE Trans. Comput.
, vol.63
, Issue.2
, pp. 510-524
-
-
Chim, T.1
Yiu, S.2
Hui, L.3
Li, V.4
-
13
-
-
77957259997
-
SPECS: Secure and privacy enhancing communications schemes for VANETs
-
T. Chim, S. Yiu, L. Huiand V. Li, "SPECS: Secure and privacy enhancing communications schemes for VANETs, " Ad Hoc Netw., vol. 9, no. 2, pp. 189-203, 2011.
-
(2011)
Ad Hoc Netw.
, vol.9
, Issue.2
, pp. 189-203
-
-
Chim, T.1
Yiu, S.2
Huiand, L.3
Li, V.4
-
14
-
-
84876136714
-
Conditional privacy preserving security protocol for NFC applications
-
Feb.
-
H. Eun, H. Lee and H. Oh, "Conditional privacy preserving security protocol for NFC applications, " IEEE Trans. Consumer Electron., vol. 59, no. 1, pp. 153-160, Feb. 2013.
-
(2013)
IEEE Trans. Consumer Electron.
, vol.59
, Issue.1
, pp. 153-160
-
-
Eun, H.1
Lee, H.2
Oh, H.3
-
16
-
-
74049097109
-
On noncooperative location privacy: A game-theoretic analysis
-
J. Freudiger, M. Manshaei, J. Hubaux and D. Parkes, "On noncooperative location privacy: A game-theoretic analysis, " in Proc. 16th ACM Conf. Comput. Commun. Security, 2009, pp. 324-337.
-
(2009)
Proc. 16th ACM Conf. Comput. Commun. Security
, pp. 324-337
-
-
Freudiger, J.1
Manshaei, M.2
Hubaux, J.3
Parkes, D.4
-
18
-
-
84856471625
-
Secure and efficient handover authentication based on bilinear pairing functions
-
Jan.
-
D. He, C. Chen, S. Chan and J. Bu, "Secure and efficient handover authentication based on bilinear pairing functions, " IEEE Trans. Wireless Commun., vol. 11, no. 1, pp. 48-53, Jan. 2012.
-
(2012)
IEEE Trans. Wireless Commun.
, vol.11
, Issue.1
, pp. 48-53
-
-
He, D.1
Chen, C.2
Chan, S.3
Bu, J.4
-
20
-
-
84887266426
-
B-SPECS+: Batch verification for secure pseudonymous authentication in VANET
-
Nov.
-
S. Horng, S. Tzeng, Y. Pan, P. Fan, X. Wang, T. Li and M. Khan, "b-SPECS+: Batch verification for secure pseudonymous authentication in VANET, " IEEE Trans. Inf. Forensics Security, vol. 8, no. 11, pp. 1860-1875, Nov. 2013.
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.11
, pp. 1860-1875
-
-
Horng, S.1
Tzeng, S.2
Pan, Y.3
Fan, P.4
Wang, X.5
Li, T.6
Khan, M.7
-
22
-
-
84908318725
-
Data aggregation in VANETs-A generalized framework for channel load adaptive schemes
-
J. Jiru, L. Bremer and K. Graffi, "Data aggregation in VANETs-A generalized framework for channel load adaptive schemes, " in Proc. 39th Annu. IEEE Conf. Local Comput. Netw., 2014, pp. 394-397.
-
(2014)
Proc. 39th Annu IEEE Conf. Local Comput. Netw.
, pp. 394-397
-
-
Jiru, J.1
Bremer, L.2
Graffi, K.3
-
23
-
-
36749076982
-
GSIS: A secure and privacypreserving protocol for vehicular communications
-
Nov.
-
X. Lin, X. Sun, P. Ho and X. Shen, "GSIS: A secure and privacypreserving protocol for vehicular communications, " IEEE Trans. Veh. Technol., vol. 56, no. 6, pp. 3442-3456, Nov. 2007.
-
(2007)
IEEE Trans. Veh. Technol.
, vol.56
, Issue.6
, pp. 3442-3456
-
-
Lin, X.1
Sun, X.2
Ho, P.3
Shen, X.4
-
24
-
-
84856182115
-
Pseudonym changing at social spots: An effective strategy for location privacy in VANETs
-
Jan.
-
R. Lu, X. Li, T. H. Luan, X. Liang and X. Shen, "Pseudonym changing at social spots: An effective strategy for location privacy in VANETs, " IEEE Trans. Veh. Technol., vol. 61, no. 1, pp. 86-96, Jan. 2012.
-
(2012)
IEEE Trans. Veh. Technol.
, vol.61
, Issue.1
, pp. 86-96
-
-
Lu, R.1
Li, X.2
Luan, T.H.3
Liang, X.4
Shen, X.5
-
25
-
-
51349156734
-
ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications
-
Phoenix, AZ, USA
-
R. Lu, X. Lin, H. Zhu, P. Ho and X. Shen, "ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications, " presented at the 27th IEEE Conf. Comput. Commun., Phoenix, AZ, USA, 2008.
-
(2008)
The 27th IEEE Conf. Comput. Commun.
-
-
Lu, R.1
Lin, X.2
Zhu, H.3
Ho, P.4
Shen, X.5
-
26
-
-
58149135996
-
Pseudonym-on-demand: A new pseudonym refill strategy for vehicular communications
-
Z. Ma, F. Kargl and M. Weber, "Pseudonym-on-demand: A new pseudonym refill strategy for vehicular communications, " in Proc. 68th IEEE Veh. Technol. Conf., 2008, pp. 1-5.
-
(2008)
Proc. 68th IEEE Veh. Technol. Conf.
, pp. 1-5
-
-
Ma, Z.1
Kargl, F.2
Weber, M.3
-
27
-
-
84978629656
-
-
Multiprecision Integer and Rational Arithmetic Cryptographic Library. Available Oct.
-
Multiprecision Integer and Rational Arithmetic Cryptographic Library. Available: http://www.certivox.com/miracl/, Oct. 2015.
-
(2015)
-
-
-
28
-
-
0041863206
-
Can D. S. A be improved Complexity trade-offs with the Digital Signature Standard
-
D. Naccache, D. M'Raihi, S. Vaudenay and D. Raphaeli, "Can D. S. A be improved Complexity trade-offs with the Digital Signature Standard, " in Proc. Workshop Theory Appl. Cryptographic Tech., 1995, pp. 77-85.
-
(1995)
Proc. Workshop Theory Appl. Cryptographic Tech.
, pp. 77-85
-
-
Naccache, D.1
M'Raihi, D.2
Vaudenay, S.3
Raphaeli, D.4
-
29
-
-
84881021389
-
VeMAC: A TDMA-based MAC protocol for reliable broadcast in VANETs
-
Sep.
-
H. Omar, W. Zhuang and L. Li, "VeMAC: A TDMA-based MAC protocol for reliable broadcast in VANETs, " IEEE Trans. Mobile Comput., vol. 12, no. 9, pp. 1724-1736, Sep. 2013.
-
(2013)
IEEE Trans. Mobile Comput.
, vol.12
, Issue.9
, pp. 1724-1736
-
-
Omar, H.1
Zhuang, W.2
Li, L.3
-
30
-
-
47349131000
-
Architecture for secure and private vehicular communications
-
P. Papadimitratos, L. Buttyan, J.-P. Hubaux, F. Kargl, A. Kung and M. Raya, "Architecture for secure and private vehicular communications, " in Proc. 7th Int. Conf. Intell. Transp. Syst., 2007, pp. 1-6.
-
(2007)
Proc. 7th Int. Conf. Intell. Transp. Syst.
, pp. 1-6
-
-
Papadimitratos, P.1
Buttyan, L.2
Hubaux, J.-P.3
Kargl, F.4
Kung, A.5
Raya, M.6
-
33
-
-
33845726678
-
Securing vehicular ad hoc networks
-
M. Rayaand J.-P. Hubaux, "Securing vehicular ad hoc networks, " J. Comput. Security, vol. 15, no. 1, pp. 39-68, 2007.
-
(2007)
J. Comput. Security
, vol.15
, Issue.1
, pp. 39-68
-
-
Rayaand, M.1
Hubaux, J.-P.2
-
35
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
A. Shamir, "Identity-based cryptosystems and signature schemes, " in Proc. Adv. Cryptol., 1985, pp. 47-53.
-
(1985)
Proc. Adv. Cryptol.
, pp. 47-53
-
-
Shamir, A.1
-
36
-
-
84861148363
-
CPAS: An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks
-
May
-
K. A. Shim, "CPAS: An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks, " IEEE Trans. Veh. Technol., vol. 61, no. 4, pp. 1874-1883, May 2012.
-
(2012)
IEEE Trans. Veh. Technol.
, vol.61
, Issue.4
, pp. 1874-1883
-
-
Shim, K.A.1
-
37
-
-
77955229114
-
An identity-based security system for user privacy in vehicular ad hoc networks
-
Sep.
-
J. Sun, C. Zhang, Y. Zhang and Y. Fang, "An identity-based security system for user privacy in vehicular ad hoc networks, " IEEE Trans. Parallel Distrib. Syst., vol. 21, no. 9, pp. 1227-1239, Sep. 2010.
-
(2010)
IEEE Trans. Parallel Distrib. Syst.
, vol.21
, Issue.9
, pp. 1227-1239
-
-
Sun, J.1
Zhang, C.2
Zhang, Y.3
Fang, Y.4
-
38
-
-
77951572383
-
ASIC: Aggregate signatures and certificates verification scheme for vehicular networks
-
A. Wasef and X. Shen, "ASIC: Aggregate signatures and certificates verification scheme for vehicular networks, " in Proc. IEEE Global Telecommun. Conf., 2009, pp. 4489-4494.
-
(2009)
Proc IEEE Global Telecommun. Conf.
, pp. 4489-4494
-
-
Wasef, A.1
Shen, X.2
-
39
-
-
77249157951
-
Balanced trustworthiness, safety and privacy in vehicle-to-vehicle communications
-
Feb.
-
Q. Wu, J. Domingo-Ferrer and U. Gonzalez-Nicolas, "Balanced trustworthiness, safety and privacy in vehicle-to-vehicle communications, " IEEE Trans. Veh. Technol., vol. 59, no. 2, pp. 559-573, Feb. 2010.
-
(2010)
IEEE Trans. Veh. Technol.
, vol.59
, Issue.2
, pp. 559-573
-
-
Wu, Q.1
Domingo-Ferrer, J.2
Gonzalez-Nicolas, U.3
-
40
-
-
84875839708
-
An interacting stochastic models approach for the performance evaluation of DSRC vehicular safety communication
-
May
-
X. Yin, X. Ma and K. Trivedi, "An interacting stochastic models approach for the performance evaluation of DSRC vehicular safety communication, " IEEE Trans. Comput., vol. 62, no. 5, pp. 873-885, May 2013.
-
(2013)
IEEE Trans. Comput.
, vol.62
, Issue.5
, pp. 873-885
-
-
Yin, X.1
Ma, X.2
Trivedi, K.3
-
41
-
-
84870443892
-
Vehicular ad hoc networks (VANETS): Status, results, challenges
-
Irwin and A. Hassan
-
S. Zeadally, R. Hunt, Y. Chen, A. Irwin and A. Hassan, "Vehicular ad hoc networks (VANETS): Status, results, challenges, " Telecommun. Syst., vol. 50, no. 4, pp. 217-241, 2012.
-
(2012)
Telecommun. Syst.
, vol.50
, Issue.4
, pp. 217-241
-
-
Zeadally, S.1
Hunt, R.2
Chen A, Y.3
-
42
-
-
51449098979
-
An efficient identitybased batch verification scheme for vehicular sensor networks
-
C. Zhang, R. Lu, X. Lin, P. Ho and X. Shen, "An efficient identitybased batch verification scheme for vehicular sensor networks, " in Proc. 27th IEEE Conf. Comput. Commun., 2008, pp. 246-250.
-
(2008)
Proc. 27th IEEE Conf. Comput. Commun.
, pp. 246-250
-
-
Zhang, C.1
Lu, R.2
Lin, X.3
Ho, P.4
Shen, X.5
-
43
-
-
84978747269
-
-
L. Zhang, C. Hu, Q. Wu, J. Domingo-Ferrer and B. Qin, "On the security of privacy-preserving vehicular communication authentication with hierarchical aggregation and fast response, " http://arxiv.org/abs/1508.01575.
-
On the Security of Privacy-preserving Vehicular Communication Authentication with Hierarchical Aggregation and Fast Response
-
-
Zhang, L.1
Hu, C.2
Wu, Q.3
Domingo-Ferrer, J.4
Qin, B.5
-
44
-
-
77952252546
-
A scalable robust authentication protocol for secure vehicular communications
-
May
-
L. Zhang, Q. Wu, A. Solanas and J. Domingo-Ferrer, "A scalable robust authentication protocol for secure vehicular communications, " IEEE Trans. Veh. Technol., vol. 59, no. 4, pp. 1606-1617, May 2010.
-
(2010)
IEEE Trans. Veh. Technol.
, vol.59
, Issue.4
, pp. 1606-1617
-
-
Zhang, L.1
Wu, Q.2
Solanas, A.3
Domingo-Ferrer, J.4
-
45
-
-
84958926233
-
Practical secure and privacy-preserving scheme for value-added applications in VANETs
-
to appear (available online since Aug. 13
-
L. Zhang, Q. Wu, B. Qin and J. Domingo-Ferrer, "Practical secure and privacy-preserving scheme for value-added applications in VANETs, " Comput. Commun., to appear (available online since Aug. 13, 2015, doi:10.1016/j.comcom.2015.08.005).
-
(2015)
Comput. Commun.
-
-
Zhang, L.1
Wu, Q.2
Qin, B.3
Domingo-Ferrer, J.4
-
46
-
-
80054828476
-
APPA: Aggregate privacy-preserving authentication in vehicular ad hoc networks
-
L. Zhang, Q. Wu, B. Qin and J. Domingo-Ferrer, "APPA: Aggregate privacy-preserving authentication in vehicular ad hoc networks, " in Proc. 14th Inf. Security Conf., 2011, pp. 293-308.
-
(2011)
Proc. 14th Inf. Security Conf.
, pp. 293-308
-
-
Zhang, L.1
Wu, Q.2
Qin, B.3
Domingo-Ferrer, J.4
-
47
-
-
63449122349
-
Digital signcryption or how to achieve cost (signature + encryption) cost (signature)+ cost (encryption)
-
Y. Zheng, "Digital signcryption or how to achieve cost (signature + encryption) cost (signature)+ cost (encryption), " in Proc. 17th Annu. Int. Cryptol. Conf. Adv. Cryptol., 1997, pp. 165-179.
-
(1997)
Proc. 17th Annu. Int. Cryptol. Conf. Adv. Cryptol.
, pp. 165-179
-
-
Zheng, Y.1
-
48
-
-
51249087922
-
AEMA: An aggregated emergency message authentication scheme for enhancing the security of vehicular ad hoc networks
-
H. Zhu, X. Lin, R. Lu, P. Ho and X. Shen, "AEMA: An aggregated emergency message authentication scheme for enhancing the security of vehicular ad hoc networks, " in Proc. IEEE Int. Conf. Commun., 2008, pp. 1436-1440.
-
(2008)
Proc IEEE Int. Conf. Commun.
, pp. 1436-1440
-
-
Zhu, H.1
Lin, X.2
Lu, R.3
Ho, P.4
Shen, X.5
-
49
-
-
84896875258
-
Efficient privacy-preserving authentication for vehicular ad hoc networks
-
Feb.
-
X. Zhu, S. Jiang, L. Wang and H. Li, "Efficient privacy-preserving authentication for vehicular ad hoc networks, " IEEE Trans. Veh. Technol., vol. 63, no. 2, pp. 907-919, Feb. 2014.
-
(2014)
IEEE Trans. Veh. Technol.
, vol.63
, Issue.2
, pp. 907-919
-
-
Zhu, X.1
Jiang, S.2
Wang, L.3
Li, H.4
-
50
-
-
0017493286
-
A universal algorithm for sequential data compression
-
May
-
J. Ziv and A. Lempel, "A universal algorithm for sequential data compression, " IEEE Trans. Inf. Theory, vol. IT-23, no. 3, pp. 337-343, May 1977.
-
(1977)
IEEE Trans. Inf. Theory
, vol.IT-23
, Issue.3
, pp. 337-343
-
-
Ziv, J.1
Lempel, A.2
|