4.6 Article

Comparative Experiments of V2X Security Protocol Based on Hash Chain Cryptography

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Hardware & Architecture

Security issues and challenges in V2X: A Survey

Amrita Ghosal et al.

COMPUTER NETWORKS (2020)

Article Computer Science, Information Systems

PKI4IoT: Towards public key infrastructure for the Internet of Things

Joel Hoglund et al.

COMPUTERS & SECURITY (2020)

Article Computer Science, Information Systems

A Decentralized Lightweight Authentication and Privacy Protocol for Vehicular Networks

Shimaa A. Abdel Hakeem et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

A Comparative Experimental Analysis of Channel Access Protocols in Vehicular Networks

Mohamed A. Abd El-Gawad et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

An Efficient V2I Authentication Scheme for VANETs

Yousheng Zhou et al.

MOBILE INFORMATION SYSTEMS (2018)

Article Engineering, Electrical & Electronic

Enhancing Security and Privacy for Identity-Based Batch Verification Scheme in VANETs

Shiang-Feng Tzeng et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2017)

Proceedings Paper Multidisciplinary Sciences

High Speed Implementation of the Keyed-Hash Message Authentication Code (HMAC) Based on SHA-1 Algorithm

Shamsiah Binti Suhaili et al.

ADVANCED SCIENCE LETTERS (2017)

Article Engineering, Electrical & Electronic

2FLIP: A Two-Factor Lightweight Privacy-Preserving Authentication Scheme for VANET

Fei Wang et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2016)

Article Chemistry, Analytical

Security in Intelligent Transport Systems for Smart Cities: From Theory to Practice

Muhammad Awais Javed et al.

SENSORS (2016)

Article Computer Science, Theory & Methods

An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks

Debiao He et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)

Article Computer Science, Information Systems

A secure authentication scheme for VANETs with batch verification

Majid Bayat et al.

WIRELESS NETWORKS (2015)

Article Computer Science, Information Systems

VANET security surveys

Richard Gilles Engoulou et al.

COMPUTER COMMUNICATIONS (2014)

Article Computer Science, Information Systems

Certificateless broadcast authentication for vehicular ad hoc networks

Eun-Kyung Ryu et al.

SECURITY AND COMMUNICATION NETWORKS (2013)

Article Engineering, Electrical & Electronic

ABAKA: An Anonymous Batch Authenticated and Key Agreement Scheme for Value-Added Services in Vehicular Ad Hoc Networks

Jiun-Long Huang et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2011)

Article Computer Science, Information Systems

Flexible, Extensible, and Efficient VANET Authentication

Ahren Studer et al.

JOURNAL OF COMMUNICATIONS AND NETWORKS (2009)