相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。5G Vehicle-to-Everything Services: Gearing Up for Security and Privacy
Rongxing Lu et al.
PROCEEDINGS OF THE IEEE (2020)
Current and future developments to improve 5G-NewRadio performance in vehicle-to-everything communications
Shimaa A. Abdel Hakeem et al.
TELECOMMUNICATION SYSTEMS (2020)
5G-V2X: standardization, architecture, use cases, network-slicing, and edge-computing
Shimaa A. Abdel Hakeem et al.
WIRELESS NETWORKS (2020)
Comparative Experiments of V2X Security Protocol Based on Hash Chain Cryptography
Shimaa A. Abdel Hakeem et al.
SENSORS (2020)
Symmetric key based 5G AKA authentication protocol satisfying anonymity and unlinkability
An Braeken
COMPUTER NETWORKS (2020)
Cyber security challenges and solutions for V2X communications: A survey
Aljawharah Alnasser et al.
COMPUTER NETWORKS (2019)
5G V2X System-Level Architecture of 5GCAR Project
Massimo Condoluci et al.
FUTURE INTERNET (2019)
A Decentralized Lightweight Authentication and Privacy Protocol for Vehicular Networks
Shimaa A. Abdel Hakeem et al.
IEEE ACCESS (2019)
Survey on existing authentication issues for cellular-assisted V2X communication
Mujahid Muhammad et al.
VEHICULAR COMMUNICATIONS (2018)
Enhancing Security and Privacy for Identity-Based Batch Verification Scheme in VANETs
Shiang-Feng Tzeng et al.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2017)
5G MM WAVE POSITIONING FOR VEHICULAR NETWORKS
Henk Wymeersch et al.
IEEE WIRELESS COMMUNICATIONS (2017)
LTE Release 14 Outlook
Christian Hoymann et al.
IEEE COMMUNICATIONS MAGAZINE (2016)
An Efficient Conditional Privacy-Preserving Authentication Scheme for Vehicular Sensor Networks Without Pairings
Nai-Wei Lo et al.
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2016)
Interworking of DSRC and Cellular Network Technologies for V2X Communications: A Survey
Khadige Abboud et al.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2016)
5G ULTRA-DENSE CELLULAR NETWORKS
Xiaohu Ge et al.
IEEE WIRELESS COMMUNICATIONS (2016)
An efficient anonymous authentication protocol using batch operations for VANETs
Yawei Liu et al.
MULTIMEDIA TOOLS AND APPLICATIONS (2016)
An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks
Debiao He et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)
METAHEURISTICS FOR THE DEPLOYMENT OF 5G
Chun-Wei Tsai et al.
IEEE WIRELESS COMMUNICATIONS (2015)
An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks
Shi-Jinn Horng et al.
INFORMATION SCIENCES (2015)
Vehicular networking: Asurvey on spectrum access technologies and persisting challenges
Ribal F. Atallah et al.
VEHICULAR COMMUNICATIONS (2015)
A secure authentication scheme for VANETs with batch verification
Majid Bayat et al.
WIRELESS NETWORKS (2015)
LTE and IEEE 802.11p for vehicular networking: a performance evaluation
Zeeshan Hameed Mir et al.
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING (2014)
Pairings for cryptographers
Steven D. Galbraith et al.
DISCRETE APPLIED MATHEMATICS (2008)
Short signatures from the Weil pairing
D Boneh et al.
JOURNAL OF CRYPTOLOGY (2004)