Related references
Note: Only part of the references are listed.Mobility Trace Analysis for Intelligent Vehicular Networks: Methods, Models, and Applications
Clayson Celes et al.
ACM COMPUTING SURVEYS (2022)
Design of Blockchain-Based Lightweight V2I Handover Authentication Protocol for VANET
Seunghwan Son et al.
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING (2022)
RAPCHI: Robust authentication protocol for IoMT-based cloud-healthcare infrastructure
Vinod Kumar et al.
JOURNAL OF SUPERCOMPUTING (2022)
An elliptic curve cryptography based mutual authentication scheme for smart grid communications using biometric approach
Akber Ali Khan et al.
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES (2022)
PA-CRT: Chinese Remainder Theorem Based Conditional Privacy-Preserving Authentication Scheme in Vehicular Ad-Hoc Networks
Jing Zhang et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2021)
A secure and efficient key agreement framework for critical energy infrastructure using mobile device
Akber Ali Khan et al.
TELECOMMUNICATION SYSTEMS (2021)
ARAP-SG: Anonymous and Reliable Authentication Protocol for Smart Grids
Muhammad Tanveer et al.
IEEE ACCESS (2021)
Edge Computing-Based Privacy-Preserving Authentication Framework and Protocol for 5G-Enabled Vehicular Networks
Jing Zhang et al.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2020)
A Provably Secure and Efficient Authenticated Key Agreement Scheme for Energy Internet-Based Vehicle-to-Grid Technology Framework
Azeem Irshad et al.
IEEE TRANSACTIONS ON INDUSTRY APPLICATIONS (2020)
LAKE-IoD: Lightweight Authenticated Key Exchange Protocol for the Internet of Drone Environment
Muhammad Tanveer et al.
IEEE ACCESS (2020)
An Efficient and Provably Secure Anonymous User Authentication and Key Agreement for Mobile Cloud Computing
Jiaqing Mo et al.
WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2019)
A provable and secure mobile user authentication scheme for mobile cloud computing services
Azeem Irshad et al.
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2019)
RSMA: Reputation System-Based Lightweight Message Authentication Framework and Protocol for 5G-Enabled Vehicular Networks
Jie Cui et al.
IEEE INTERNET OF THINGS JOURNAL (2019)
An Efficient Privacy-Preserving Authentication Scheme for Energy Internet-Based Vehicle-to-Grid Communication
Prosanta Gope et al.
IEEE TRANSACTIONS ON SMART GRID (2019)
A secure elliptic curve cryptography based mutual authentication protocol for cloud-assisted TMIS
Vinod Kumar et al.
TELEMATICS AND INFORMATICS (2019)
Integrated Authentication and Key Agreement Framework for Vehicular Cloud Computing
Qi Jiang et al.
IEEE NETWORK (2018)
Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services
Debiao He et al.
IEEE SYSTEMS JOURNAL (2018)
A Secure and Efficient Authentication Technique for Vehicular Ad-Hoc Networks
Maryam Rajabzadeh Asaar et al.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2018)
An Efficient Mutual Authentication Framework for Healthcare System in Cloud Computing
Vinod Kumar et al.
JOURNAL OF MEDICAL SYSTEMS (2018)
EPA-CPPA: An efficient, provably-secure and anonymous conditional privacy-preserving authentication scheme for vehicular ad hoc networks
JiLiang Li et al.
VEHICULAR COMMUNICATIONS (2018)
A new and secure authentication scheme for wireless sensor networks with formal proof
Fan Wu et al.
PEER-TO-PEER NETWORKING AND APPLICATIONS (2017)
Secure and distributed certification system architecture for safety message authentication in VANET
Tiziri Oulhaci et al.
TELECOMMUNICATION SYSTEMS (2017)
Provably secure authenticated key agreement scheme for distributed mobile cloud computing services
Vanga Odelu et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2017)
Security, Privacy, and Fairness in Fog-Based Vehicular Crowdsensing
Jianbing Ni et al.
IEEE COMMUNICATIONS MAGAZINE (2017)
Security and Privacy in Smart City Applications: Challenges and Solutions
Kuan Zhang et al.
IEEE COMMUNICATIONS MAGAZINE (2017)
OTIBAAGKA: A New Security Tool for Cryptographic Mix-Zone Establishment in Vehicular Ad Hoc Networks
Lei Zhang
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)
Distributed Aggregate Privacy-Preserving Authentication in VANETs
Lei Zhang et al.
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2017)
Soft-Defined Heterogeneous Vehicular Network: Architecture and Challenges
Kan Zheng et al.
IEEE NETWORK (2016)
An Efficient Conditional Privacy-Preserving Authentication Scheme for Vehicular Sensor Networks Without Pairings
Nai-Wei Lo et al.
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2016)
Robust Biometrics-Based Authentication Scheme for Multiserver Environment
Debiao He et al.
IEEE SYSTEMS JOURNAL (2015)
An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks
Debiao He et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)
Toward Vehicle-Assisted Cloud Computing for Smartphones
Hongli Zhang et al.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2015)
A survey on vehicular cloud computing
Md Whaiduzzaman et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2014)
Connected Vehicles: Solutions and Challenges
Ning Lu et al.
IEEE INTERNET OF THINGS JOURNAL (2014)
Toward Cloud-Based Vehicular Networks with Efficient Resource Management
Rong Yu et al.
IEEE NETWORK (2013)
Security Challenges in Vehicular Cloud Computing
Gongjun Yan et al.
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2013)
Reconstruction of a Secure Authentication Scheme for Vehicular Ad Hoc Networks Using a Binary Authentication Tree
Kyung-Ah Shim
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2013)
A lightweight identity authentication protocol for vehicular networks
Jung-Shian Li et al.
TELECOMMUNICATION SYSTEMS (2013)
Toward a secure batch verification with group testing for VANET
Cheng-Chi Lee et al.
WIRELESS NETWORKS (2013)
An Efficient Authentication Scheme for Telecare Medicine Information Systems
Zhian Zhu
JOURNAL OF MEDICAL SYSTEMS (2012)
BAT: A Robust Signature Scheme for Vehicular Networks Using Binary Authentication Tree
Yixin Jiang et al.
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2009)