4.4 Article

SEBAP: A secure and efficient biometric-assisted authentication protocol using ECC for vehicular cloud computing

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

A trajectory privacy-preserving scheme based on a dual-K mechanism for continuous location-based services

Shaobo Zhang et al.

INFORMATION SCIENCES (2020)

Article Computer Science, Information Systems

An Efficient and Provably Secure Anonymous User Authentication and Key Agreement for Mobile Cloud Computing

Jiaqing Mo et al.

WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2019)

Article Computer Science, Theory & Methods

A caching and spatial K-anonymity driven privacy enhancement scheme in continuous location-based services

Shaobo Zhang et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)

Article Information Science & Library Science

A secure elliptic curve cryptography based mutual authentication protocol for cloud-assisted TMIS

Vinod Kumar et al.

TELEMATICS AND INFORMATICS (2019)

Article Computer Science, Hardware & Architecture

Integrated Authentication and Key Agreement Framework for Vehicular Cloud Computing

Qi Jiang et al.

IEEE NETWORK (2018)

Article Computer Science, Information Systems

Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services

Debiao He et al.

IEEE SYSTEMS JOURNAL (2018)

Article Engineering, Electrical & Electronic

A Secure and Efficient Authentication Technique for Vehicular Ad-Hoc Networks

Maryam Rajabzadeh Asaar et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2018)

Article Health Care Sciences & Services

An Efficient Mutual Authentication Framework for Healthcare System in Cloud Computing

Vinod Kumar et al.

JOURNAL OF MEDICAL SYSTEMS (2018)

Article Computer Science, Information Systems

A new and secure authentication scheme for wireless sensor networks with formal proof

Fan Wu et al.

PEER-TO-PEER NETWORKING AND APPLICATIONS (2017)

Article Telecommunications

Secure and distributed certification system architecture for safety message authentication in VANET

Tiziri Oulhaci et al.

TELECOMMUNICATION SYSTEMS (2017)

Article Computer Science, Theory & Methods

Provably secure authenticated key agreement scheme for distributed mobile cloud computing services

Vanga Odelu et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2017)

Article Engineering, Electrical & Electronic

Security, Privacy, and Fairness in Fog-Based Vehicular Crowdsensing

Jianbing Ni et al.

IEEE COMMUNICATIONS MAGAZINE (2017)

Article Engineering, Electrical & Electronic

Security and Privacy in Smart City Applications: Challenges and Solutions

Kuan Zhang et al.

IEEE COMMUNICATIONS MAGAZINE (2017)

Article Computer Science, Theory & Methods

OTIBAAGKA: A New Security Tool for Cryptographic Mix-Zone Establishment in Vehicular Ad Hoc Networks

Lei Zhang

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Article Engineering, Civil

Distributed Aggregate Privacy-Preserving Authentication in VANETs

Lei Zhang et al.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2017)

Article Computer Science, Information Systems

An intelligent RFID-enabled authentication scheme for healthcare applications in vehicular mobile cloud

Neeraj Kumar et al.

PEER-TO-PEER NETWORKING AND APPLICATIONS (2016)

Article Computer Science, Artificial Intelligence

An Efficient Multiple Session Key Establishment Scheme for VANET Group Integration

Cheng-Chi Lee et al.

IEEE INTELLIGENT SYSTEMS (2016)

Article Computer Science, Hardware & Architecture

Soft-Defined Heterogeneous Vehicular Network: Architecture and Challenges

Kan Zheng et al.

IEEE NETWORK (2016)

Article Engineering, Civil

An Efficient Conditional Privacy-Preserving Authentication Scheme for Vehicular Sensor Networks Without Pairings

Nai-Wei Lo et al.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2016)

Article Computer Science, Hardware & Architecture

A privacy preserving three-factor authentication protocol for e-Health clouds

Qi Jiang et al.

JOURNAL OF SUPERCOMPUTING (2016)

Article Computer Science, Information Systems

Robust Biometrics-Based Authentication Scheme for Multiserver Environment

Debiao He et al.

IEEE SYSTEMS JOURNAL (2015)

Article Computer Science, Theory & Methods

An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks

Debiao He et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)

Article Engineering, Electrical & Electronic

Toward Vehicle-Assisted Cloud Computing for Smartphones

Hongli Zhang et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2015)

Review Computer Science, Hardware & Architecture

A survey on vehicular cloud computing

Md Whaiduzzaman et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2014)

Review Computer Science, Information Systems

Connected Vehicles: Solutions and Challenges

Ning Lu et al.

IEEE INTERNET OF THINGS JOURNAL (2014)

Article Telecommunications

Survey on VANET security challenges and possible cryptographic solutions

Mohamed Nidhal Mejri et al.

VEHICULAR COMMUNICATIONS (2014)

Article Computer Science, Hardware & Architecture

Toward Cloud-Based Vehicular Networks with Efficient Resource Management

Rong Yu et al.

IEEE NETWORK (2013)

Article Engineering, Civil

Security Challenges in Vehicular Cloud Computing

Gongjun Yan et al.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2013)

Article Engineering, Electrical & Electronic

Reconstruction of a Secure Authentication Scheme for Vehicular Ad Hoc Networks Using a Binary Authentication Tree

Kyung-Ah Shim

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2013)

Article Telecommunications

A lightweight identity authentication protocol for vehicular networks

Jung-Shian Li et al.

TELECOMMUNICATION SYSTEMS (2013)

Article Computer Science, Information Systems

Toward a secure batch verification with group testing for VANET

Cheng-Chi Lee et al.

WIRELESS NETWORKS (2013)

Article Health Care Sciences & Services

An Efficient Authentication Scheme for Telecare Medicine Information Systems

Zhian Zhu

JOURNAL OF MEDICAL SYSTEMS (2012)

Article Engineering, Electrical & Electronic

BAT: A Robust Signature Scheme for Vehicular Networks Using Binary Authentication Tree

Yixin Jiang et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2009)