相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。Private blockchain-based access control mechanism for unauthorized UAV detection and mitigation in Internet of Drones environment
Basudeb Bera et al.
COMPUTER COMMUNICATIONS (2021)
Big data algorithms and applications in intelligent transportation system: A review and bibliometric analysis
Sepideh Kaffash et al.
INTERNATIONAL JOURNAL OF PRODUCTION ECONOMICS (2021)
A Decoupled Blockchain Approach for Edge-Envisioned IoT-Based Healthcare Monitoring
Gagangeet Singh Aujla et al.
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2021)
VESPA: A Framework for Optimizing Heterogeneous Sensor Placement and Orientation for Autonomous Vehicles
Joydeep Dey et al.
IEEE CONSUMER ELECTRONICS MAGAZINE (2021)
Blockchain-Enabled Certificate-Based Authentication for Vehicle Accident Detection and Notification in Intelligent Transportation Systems
Anusha Vangala et al.
IEEE SENSORS JOURNAL (2021)
Privacy-Aware Autonomous Valet Parking: Towards Experience Driven Approach
Shiva Raj Pokhrel et al.
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2021)
Fortified-Chain: A Blockchain-Based Framework for Security and Privacy-Assured Internet of Medical Things With Effective Access Control
Bhaskara S. Egala et al.
IEEE INTERNET OF THINGS JOURNAL (2021)
A secure authentication scheme framework for mobile-sinks used in the Internet of Drones applications
Yoney Kirsal Ever
COMPUTER COMMUNICATIONS (2020)
PoBT: A Lightweight Consensus Algorithm for Scalable IoT Business Blockchain
Sujit Biswas et al.
IEEE INTERNET OF THINGS JOURNAL (2020)
Federated Learning for Data Privacy Preservation in Vehicular Cyber-Physical Systems
Yunlong Lu et al.
IEEE NETWORK (2020)
BSV-PAGS: Blockchain-based special vehicles priority access guarantee scheme
Yue Wang et al.
COMPUTER COMMUNICATIONS (2020)
Blockchain-Envisioned Secure Data Delivery and Collection Scheme for 5G-Based IoT-Enabled Internet of Drones Environment
Basudeb Bera et al.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2020)
BC-SABE: Blockchain-Aided Searchable Attribute-Based Encryption for Cloud-IoT
Suhui Liu et al.
IEEE INTERNET OF THINGS JOURNAL (2020)
Decentralized Public Key Infrastructures atop Blockchain
Yannan Li et al.
IEEE NETWORK (2020)
Using ID-Based Authentication and Key Agreement Mechanism for Securing Communication in Advanced Metering Infrastructure
Shaik Mullapathi Farooq et al.
IEEE ACCESS (2020)
Review on big data applications in safety research of intelligent transportation systems and connected/automated vehicles
Yanqi Lian et al.
ACCIDENT ANALYSIS AND PREVENTION (2020)
Blockchain-Based Energy Trading in Electric-Vehicle-Enabled Microgrids
Ifiok Anthony Umoren et al.
IEEE CONSUMER ELECTRONICS MAGAZINE (2020)
Designing Secure Lightweight Blockchain-Enabled RFID-Based Authentication Protocol for Supply Chains in 5G Mobile Edge Computing Environment
Srinivas Jangirala et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)
An Efficient Authentication and Key Agreement Scheme Based on ECDH for Wireless Sensor Network
Mostafa Farhadi Moghadam et al.
IEEE ACCESS (2020)
Securing Smart City Surveillance: A Lightweight Authentication Mechanism for Unmanned Vehicles
Zeeshan Ali et al.
IEEE ACCESS (2020)
AAAS: An Anonymous Authentication Scheme Based on Group Signature in VANETs
Yanji Jiang et al.
IEEE ACCESS (2020)
Big Data Analytics in Intelligent Transportation Systems: A Survey
Li Zhu et al.
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2019)
An Efficient Message-Authentication Scheme Based on Edge Computing for Vehicular Ad Hoc Networks
Jie Cui et al.
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2019)
Vehicular Communications: A Network Layer Perspective
Haixia Peng et al.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2019)
Design of secure key management and user authentication scheme for fog computing services
Mohammad Wazid et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)
BEST: Blockchain-based secure energy trading in SDN-enabled intelligent transportation system
Rajat Chaudhary et al.
COMPUTERS & SECURITY (2019)
AKM-IoV: Authenticated Key Management Protocol in Fog Computing-Based Internet of Vehicles Deployment
Mohammad Wazid et al.
IEEE INTERNET OF THINGS JOURNAL (2019)
Modeling of Smart Cities Based on ITS Architecture
Ondrej Pribyl et al.
IEEE INTELLIGENT TRANSPORTATION SYSTEMS MAGAZINE (2019)
LSCSH: Lattice-Based Secure Cryptosystem for Smart Healthcare in Smart Cities Environment
Rajat Chaudhary et al.
IEEE COMMUNICATIONS MAGAZINE (2018)
Software Platform for Heterogeneous In-Vehicle Environments
Milena Milosevic et al.
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS (2018)
Secure Message Communication Protocol Among Vehicles in Smart City
Amit Dua et al.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2018)
Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks
Mohammad Wazid et al.
IEEE INTERNET OF THINGS JOURNAL (2018)
Low-Complexity Charging/Discharging Scheduling for Electric Vehicles at Home and Common Lots for Smart Households Prosumers
Abbas Mehrabi et al.
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS (2018)
Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment
Ashok Kumar Das et al.
IEEE INTERNET OF THINGS JOURNAL (2018)
Efficient Privacy-Preserving Dual Authentication and Key Agreement Scheme for Secure V2V Communications in an IoV Paradigm
Yanbing Liu et al.
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2017)
Provably secure user authentication and key agreement scheme for wireless sensor networks
Ashok Kumar Das et al.
SECURITY AND COMMUNICATION NETWORKS (2016)
A random key establishment scheme for multi-phase deployment in large-scale distributed sensor networks
Ashok Kumar Das
INTERNATIONAL JOURNAL OF INFORMATION SECURITY (2012)
Dedicated Short-Range Communications (DSRC) Standards in the United States
John B. Kenney
PROCEEDINGS OF THE IEEE (2011)
Practical byzantine fault tolerance and proactive recovery
M Castro et al.
ACM TRANSACTIONS ON COMPUTER SYSTEMS (2002)
Examining smart-card security under the threat of power analysis attacks
TS Messerges et al.
IEEE TRANSACTIONS ON COMPUTERS (2002)