4.6 Article

An Efficient Privacy-preserving Authentication Model based on blockchain for VANETs

Related references

Note: Only part of the references are listed.
Article Computer Science, Hardware & Architecture

Edge-based auditing method for data security in resource-constrained Internet of Things

Tian Wang et al.

Summary: In response to the security management challenges brought by the growth of IoT data, this paper proposes an auditing model based on binary trees and edge computing. By offloading the data preprocessing task to the edge, the computational load is reduced, and by improving the correlation mechanism between nodes and data blocks, audit efficiency is enhanced.

JOURNAL OF SYSTEMS ARCHITECTURE (2021)

Article Automation & Control Systems

Multiobjective 3-D Topology Optimization of Next-Generation Wireless Data Center Network

Bin Cao et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)

Article Computer Science, Information Systems

BLA: Blockchain-Assisted Lightweight Anonymous Authentication for Distributed Vehicular Fog Services

Yingying Yao et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Computer Science, Theory & Methods

Privacy-Preserving Cloud-Based Road Condition Monitoring With Source Authentication in VANETs

Yujue Wang et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)

Article Computer Science, Hardware & Architecture

A Blockchain-Based Privacy-Preserving Authentication Scheme for VANETs

Zhaojun Lu et al.

IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS (2019)

Proceedings Paper Computer Science, Information Systems

Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains

Elli Androulaki et al.

EUROSYS '18: PROCEEDINGS OF THE THIRTEENTH EUROSYS CONFERENCE (2018)

Article Engineering, Electrical & Electronic

Message Authentication Using Proxy Vehicles in Vehicular Ad Hoc Networks

Yiliang Liu et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2015)

Article Computer Science, Hardware & Architecture

Certificate Transparency

Ben Laurie

COMMUNICATIONS OF THE ACM (2014)

Article Engineering, Electrical & Electronic

CPAS: An Efficient Conditional Privacy-Preserving Authentication Scheme for Vehicular Sensor Networks

Kyung-Ah Shim

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2012)

Article Engineering, Electrical & Electronic

ABAKA: An Anonymous Batch Authenticated and Key Agreement Scheme for Value-Added Services in Vehicular Ad Hoc Networks

Jiun-Long Huang et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2011)

Article Engineering, Electrical & Electronic

AMOEBA: Robust location privacy scheme for VANET

Krishna Sampigethaya et al.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2007)