Related references
Note: Only part of the references are listed.Reliable and Efficient Content Sharing for 5G-Enabled Vehicular Networks
Jie Cui et al.
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2022)
Personalized Location Privacy Protection Based on Vehicle Movement Regularity in Vehicular Networks
Hong Zhong et al.
IEEE SYSTEMS JOURNAL (2022)
PA-CRT: Chinese Remainder Theorem Based Conditional Privacy-Preserving Authentication Scheme in Vehicular Ad-Hoc Networks
Jing Zhang et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2021)
CorrAUC: A Malicious Bot-IoT Traffic Detection Method in IoT Network Using Machine-Learning Techniques
Muhammad Shafiq et al.
IEEE INTERNET OF THINGS JOURNAL (2021)
Anonymous certificateless multi-receiver encryption scheme for smart community management systems
Lunzhi Deng
SOFT COMPUTING (2020)
Accessibility Analysis and Modeling for IoV in an Urban Scene
Jiujun Cheng et al.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2020)
Vcash: A Novel Reputation Framework for Identifying Denial of Traffic Service in Internet of Connected Vehicles
Zhihong Tian et al.
IEEE INTERNET OF THINGS JOURNAL (2020)
An efficient conditional privacy-preserving authentication scheme for Vehicle-To-Infrastructure communication in VANETs
Ikram Ali et al.
VEHICULAR COMMUNICATIONS (2020)
Data mining and machine learning methods for sustainable smart cities traffic classification: A survey
Survey Muhammad Shafiq et al.
SUSTAINABLE CITIES AND SOCIETY (2020)
IoT malicious traffic identification using wrapper-based feature selection mechanisms
Muhammad Shafiq et al.
COMPUTERS & SECURITY (2020)
Edge Computing in VANETs-An Efficient and Privacy-Preserving Cooperative Downloading Scheme
Jie Cui et al.
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2020)
A Survey on Access Control in the Age of Internet of Things
Jing Qiu et al.
IEEE INTERNET OF THINGS JOURNAL (2020)
Secure and Efficient Data Sharing in Dynamic Vehicular Networks
Jian Shen et al.
IEEE INTERNET OF THINGS JOURNAL (2020)
Anonymous Certificate-Based Broadcast Encryption With Personalized Messages
Liqing Chen et al.
IEEE TRANSACTIONS ON BROADCASTING (2020)
An Identity-Based and Revocable Data-Sharing Scheme in VANETs
Shi-Jinn Horng et al.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2020)
A Fluid Mechanics-Based Data Flow Model to Estimate VANET Capacity
Jiujun Cheng et al.
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2020)
Extensible Conditional Privacy Protection Authentication Scheme for Secure Vehicular Networks in a Multi-Cloud Environment
Jie Cui et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2020)
BENBI: Scalable and Dynamic Access Control on the Northbound Interface of SDN-Based VANET
Jia-Si Weng et al.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2019)
Secure data sharing scheme for VANETs based on edge computing
Jingwen Pan et al.
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING (2019)
Identity-Based Broadcast Encryption with Outsourced Partial Decryption for Hybrid Security Models in Edge Computing
Jongkil Kim et al.
PROCEEDINGS OF THE 2019 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS '19) (2019)
DrivMan: Driving Trust Management and Data Sharing in VANETs with Blockchain and Smart Contracts
Uzair Javaid et al.
2019 IEEE 89TH VEHICULAR TECHNOLOGY CONFERENCE (VTC2019-SPRING) (2019)
Data sharing in VANETs based on evolutionary fuzzy game
Jianhua Liu et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)
Identity-based broadcast encryption with continuous leakage resilience
Jiguo Li et al.
INFORMATION SCIENCES (2018)
Efficient certificateless anonymous multi-receiver encryption scheme for mobile devices
Debiao He et al.
SOFT COMPUTING (2017)
Concurrently deniable ring authentication and its application to LBS in VANETs
Shengke Zeng et al.
PEER-TO-PEER NETWORKING AND APPLICATIONS (2017)
Efficient Anonymous Multireceiver Certificateless Encryption
Ying-Hao Hung et al.
IEEE SYSTEMS JOURNAL (2017)
Proxy Re-Encryption: Analysis of constructions and its application to secure access delegation
David Nunez et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2017)
Data communication in VANETs: Protocols, applications and challenges
Felipe Cunha et al.
AD HOC NETWORKS (2016)
A Survey of Proxy Re-Encryption for Secure Data Sharing in Cloud Computing
Zhiguang Qin et al.
IEEE Transactions on Services Computing (2016)
Adaptively Secure Identity-Based Broadcast Encryption With a Constant-Sized Ciphertext
Jongkil Kim et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)