4.5 Article

A novel and lightweight wireless communication scheme for Vehicular Ad hoc Networks

Related references

Note: Only part of the references are listed.
Article Engineering, Electrical & Electronic

Broadcast Encryption Scheme for V2I Communication in VANETs

Hong Zhong et al.

Summary: This research proposes a solution for addressing the problem of information redundancy in VANETs. The proposed scheme adopts identity-based broadcast encryption technology, allowing the TA to generate fixed-length ciphertext for multiple vehicles with only one encryption, thereby improving work efficiency significantly.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2022)

Article Computer Science, Cybernetics

Warning Apps for Road Safety: A Technological and Economical Perspective for Autonomous Driving - The Warning Task in the Transition from Human Driver to Automated Driving

Johanna Trager et al.

Summary: The study discusses the technological and economic prospects of warning apps in future mobility, as well as how the interaction between drivers, information systems, and driving systems will change with the transition to autonomous driving. By analyzing warning apps available in German-speaking regions, it was found that they cover various risk areas but still have operational deficits.

INTERNATIONAL JOURNAL OF HUMAN-COMPUTER INTERACTION (2021)

Article Computer Science, Information Systems

PPChain: A Privacy-Preserving Permissioned Blockchain Architecture for Cryptocurrency and Other Regulated Applications

Chao Lin et al.

Summary: In this article, a privacy-preserving permissioned blockchain architecture PPChain is proposed to introduce regulation and integrate cryptographic primitives while removing transaction fees and mining rewards. The architecture aims to provide a practical blockchain system for regulatory applications with qualitative security and privacy analysis and performance evaluation.

IEEE SYSTEMS JOURNAL (2021)

Article Computer Science, Information Systems

Anonymous Certificate-Based Inner Product Broadcast Encryption

Shuang Yao et al.

Summary: The study focuses on constructing a secure and practical inner product broadcast encryption scheme by building an anonymous certificate-based inner product broadcast encryption scheme and comparing it with existing schemes, demonstrating the scheme's advantage of anonymity. Experimental results show that the proposed scheme supports faster decryption operations and has higher efficiency.

SECURITY AND COMMUNICATION NETWORKS (2021)

Article Computer Science, Artificial Intelligence

Anonymous certificateless multi-receiver encryption scheme for smart community management systems

Lunzhi Deng

SOFT COMPUTING (2020)

Article Computer Science, Hardware & Architecture

An efficient identity-based signature scheme without bilinear pairing for vehicle-to-vehicle communication in VANETs

Ikram Ali et al.

JOURNAL OF SYSTEMS ARCHITECTURE (2020)

Article Computer Science, Information Systems

Adaptively secure certificate-based broadcast encryption and its application to cloud storage service

Liqing Chen et al.

INFORMATION SCIENCES (2020)

Article Telecommunications

A Priority-Aware Anonymous Handover Authentication Protocol for Wireless Communications

Guangsong Li et al.

WIRELESS PERSONAL COMMUNICATIONS (2020)

Article Engineering, Electrical & Electronic

Anonymous Certificate-Based Broadcast Encryption With Personalized Messages

Liqing Chen et al.

IEEE TRANSACTIONS ON BROADCASTING (2020)

Article Computer Science, Hardware & Architecture

Cluster-Based Secure Communication and Certificate Revocation Scheme for VANET

C. BrijilalRuban et al.

COMPUTER JOURNAL (2019)

Article Computer Science, Information Systems

VANETs' research over the past decade

Elmano Ramalho Cavalcanti et al.

ACM SIGCOMM Computer Communication Review (2018)

Article Computer Science, Theory & Methods

A robust and efficient password-based conditional privacy preserving authentication and group-key agreement protocol for VANETs

S. K. Hafizul Islam et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Editorial Material Engineering, Civil

Comments on Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks

Haowen Tan et al.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2018)

Article Computer Science, Information Systems

VANETs' research over the past decade

Elmano Ramalho Cavalcanti et al.

ACM SIGCOMM Computer Communication Review (2018)

Article Computer Science, Artificial Intelligence

Efficient certificateless anonymous multi-receiver encryption scheme for mobile devices

Debiao He et al.

SOFT COMPUTING (2017)

Article Engineering, Electrical & Electronic

Adaptively Secure Broadcast Encryption With Constant Ciphertexts

Dianli Guo et al.

IEEE TRANSACTIONS ON BROADCASTING (2016)

Article Engineering, Civil

Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks

Pandi Vijayakumar et al.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2016)

Article Computer Science, Information Systems

An efficient group key agreement protocol for secure P2P communication

Pandi Vijayakumar et al.

SECURITY AND COMMUNICATION NETWORKS (2016)

Review Multidisciplinary Sciences

Where Is Current Research on Blockchain Technology?-A Systematic Review

Jesse Yli-Huumo et al.

PLOS ONE (2016)

Article Computer Science, Information Systems

Message forwarding based on vehicle trajectory history in Fully Distributed Traffic Information Systems

Alain Gibaud et al.

COMPUTER COMMUNICATIONS (2015)

Article Computer Science, Information Systems

An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks

Shi-Jinn Horng et al.

INFORMATION SCIENCES (2015)

Article Computer Science, Information Systems

Chinese remainder Theorem based centralised group key management for secure multicast communication

Pandi Vijayakumar et al.

IET INFORMATION SECURITY (2014)

Article Computer Science, Theory & Methods

Internet of Things (IoT): A vision, architectural elements, and future directions

Jayavardhana Gubbi et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2013)

Article Computer Science, Hardware & Architecture

Cloud Data Protection for the Masses

Dawn Song et al.

COMPUTER (2012)

Article Engineering, Electrical & Electronic

CPAS: An Efficient Conditional Privacy-Preserving Authentication Scheme for Vehicular Sensor Networks

Kyung-Ah Shim

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2012)

Article Computer Science, Artificial Intelligence

Formalizing an Analytic Proof of the Prime Number Theorem

John Harrison

JOURNAL OF AUTOMATED REASONING (2009)