4.6 Article

Multi-Zone Authentication and Privacy-Preserving Protocol (MAPP) Based on the Bilinear Pairing Cryptography for 5G-V2X

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Engineering, Electrical & Electronic

5G Vehicle-to-Everything Services: Gearing Up for Security and Privacy

Rongxing Lu et al.

PROCEEDINGS OF THE IEEE (2020)

Article Telecommunications

Current and future developments to improve 5G-NewRadio performance in vehicle-to-everything communications

Shimaa A. Abdel Hakeem et al.

TELECOMMUNICATION SYSTEMS (2020)

Article Computer Science, Information Systems

5G-V2X: standardization, architecture, use cases, network-slicing, and edge-computing

Shimaa A. Abdel Hakeem et al.

WIRELESS NETWORKS (2020)

Article Chemistry, Analytical

Comparative Experiments of V2X Security Protocol Based on Hash Chain Cryptography

Shimaa A. Abdel Hakeem et al.

SENSORS (2020)

Article Computer Science, Hardware & Architecture

Symmetric key based 5G AKA authentication protocol satisfying anonymity and unlinkability

An Braeken

COMPUTER NETWORKS (2020)

Article Computer Science, Hardware & Architecture

Cyber security challenges and solutions for V2X communications: A survey

Aljawharah Alnasser et al.

COMPUTER NETWORKS (2019)

Article Computer Science, Information Systems

5G V2X System-Level Architecture of 5GCAR Project

Massimo Condoluci et al.

FUTURE INTERNET (2019)

Article Computer Science, Information Systems

A Decentralized Lightweight Authentication and Privacy Protocol for Vehicular Networks

Shimaa A. Abdel Hakeem et al.

IEEE ACCESS (2019)

Review Telecommunications

Survey on existing authentication issues for cellular-assisted V2X communication

Mujahid Muhammad et al.

VEHICULAR COMMUNICATIONS (2018)

Article Engineering, Electrical & Electronic

Enhancing Security and Privacy for Identity-Based Batch Verification Scheme in VANETs

Shiang-Feng Tzeng et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2017)

Article Computer Science, Hardware & Architecture

5G MM WAVE POSITIONING FOR VEHICULAR NETWORKS

Henk Wymeersch et al.

IEEE WIRELESS COMMUNICATIONS (2017)

Article Engineering, Electrical & Electronic

LTE Release 14 Outlook

Christian Hoymann et al.

IEEE COMMUNICATIONS MAGAZINE (2016)

Article Engineering, Civil

An Efficient Conditional Privacy-Preserving Authentication Scheme for Vehicular Sensor Networks Without Pairings

Nai-Wei Lo et al.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2016)

Article Engineering, Electrical & Electronic

Interworking of DSRC and Cellular Network Technologies for V2X Communications: A Survey

Khadige Abboud et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2016)

Article Computer Science, Hardware & Architecture

5G ULTRA-DENSE CELLULAR NETWORKS

Xiaohu Ge et al.

IEEE WIRELESS COMMUNICATIONS (2016)

Article Computer Science, Information Systems

An efficient anonymous authentication protocol using batch operations for VANETs

Yawei Liu et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2016)

Article Computer Science, Theory & Methods

An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks

Debiao He et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)

Article Computer Science, Hardware & Architecture

METAHEURISTICS FOR THE DEPLOYMENT OF 5G

Chun-Wei Tsai et al.

IEEE WIRELESS COMMUNICATIONS (2015)

Article Computer Science, Information Systems

An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks

Shi-Jinn Horng et al.

INFORMATION SCIENCES (2015)

Review Telecommunications

Vehicular networking: Asurvey on spectrum access technologies and persisting challenges

Ribal F. Atallah et al.

VEHICULAR COMMUNICATIONS (2015)

Article Computer Science, Information Systems

A secure authentication scheme for VANETs with batch verification

Majid Bayat et al.

WIRELESS NETWORKS (2015)

Article Engineering, Electrical & Electronic

LTE and IEEE 802.11p for vehicular networking: a performance evaluation

Zeeshan Hameed Mir et al.

EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING (2014)

Article Mathematics, Applied

Pairings for cryptographers

Steven D. Galbraith et al.

DISCRETE APPLIED MATHEMATICS (2008)

Article Computer Science, Theory & Methods

Short signatures from the Weil pairing

D Boneh et al.

JOURNAL OF CRYPTOLOGY (2004)