4.7 Article

Broadcast Encryption Scheme for V2I Communication in VANETs

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Engineering, Civil

Reliable and Efficient Content Sharing for 5G-Enabled Vehicular Networks

Jie Cui et al.

Summary: This study proposes a reliable and efficient content sharing scheme in 5G-enabled vehicular networks, which utilizes adjacent vehicles as proxy vehicles to fulfill content downloading requests and meets security requirements.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2022)

Article Computer Science, Information Systems

Personalized Location Privacy Protection Based on Vehicle Movement Regularity in Vehicular Networks

Hong Zhong et al.

Summary: This paper proposes a sensitivity-based pseudonym change mechanism to address personalized location privacy protection by adapting pseudonym change strategies based on the regularity of vehicle movement at different locations. Performance evaluation results show that this approach significantly outperforms existing methods in achieving personalized location privacy.

IEEE SYSTEMS JOURNAL (2022)

Article Computer Science, Hardware & Architecture

PA-CRT: Chinese Remainder Theorem Based Conditional Privacy-Preserving Authentication Scheme in Vehicular Ad-Hoc Networks

Jing Zhang et al.

Summary: The proposed conditional privacy-preserving authentication scheme based on Chinese remainder theorem aims to address the challenge of fast authentication in Vehicular Ad-hoc Networks. By using realistic TPDs, the scheme enhances the security of the entire system.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2021)

Article Computer Science, Information Systems

CorrAUC: A Malicious Bot-IoT Traffic Detection Method in IoT Network Using Machine-Learning Techniques

Muhammad Shafiq et al.

Summary: Researchers have proposed a new feature selection method and algorithm to accurately detect malicious traffic in IoT networks. By integrating TOPSIS and Shannon entropy methods to validate the selected features for malicious traffic identification in IoT networks, the experimental results have shown that this method is efficient and can achieve over 96% accuracy on average.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Computer Science, Artificial Intelligence

Anonymous certificateless multi-receiver encryption scheme for smart community management systems

Lunzhi Deng

SOFT COMPUTING (2020)

Article Engineering, Electrical & Electronic

Accessibility Analysis and Modeling for IoV in an Urban Scene

Jiujun Cheng et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2020)

Article Computer Science, Information Systems

Vcash: A Novel Reputation Framework for Identifying Denial of Traffic Service in Internet of Connected Vehicles

Zhihong Tian et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Construction & Building Technology

Data mining and machine learning methods for sustainable smart cities traffic classification: A survey

Survey Muhammad Shafiq et al.

SUSTAINABLE CITIES AND SOCIETY (2020)

Article Computer Science, Information Systems

IoT malicious traffic identification using wrapper-based feature selection mechanisms

Muhammad Shafiq et al.

COMPUTERS & SECURITY (2020)

Article Engineering, Electrical & Electronic

Edge Computing in VANETs-An Efficient and Privacy-Preserving Cooperative Downloading Scheme

Jie Cui et al.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2020)

Article Computer Science, Information Systems

A Survey on Access Control in the Age of Internet of Things

Jing Qiu et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Computer Science, Information Systems

Secure and Efficient Data Sharing in Dynamic Vehicular Networks

Jian Shen et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Engineering, Electrical & Electronic

Anonymous Certificate-Based Broadcast Encryption With Personalized Messages

Liqing Chen et al.

IEEE TRANSACTIONS ON BROADCASTING (2020)

Article Engineering, Electrical & Electronic

An Identity-Based and Revocable Data-Sharing Scheme in VANETs

Shi-Jinn Horng et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2020)

Article Engineering, Civil

A Fluid Mechanics-Based Data Flow Model to Estimate VANET Capacity

Jiujun Cheng et al.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2020)

Article Computer Science, Theory & Methods

Extensible Conditional Privacy Protection Authentication Scheme for Secure Vehicular Networks in a Multi-Cloud Environment

Jie Cui et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2020)

Article Engineering, Electrical & Electronic

BENBI: Scalable and Dynamic Access Control on the Northbound Interface of SDN-Based VANET

Jia-Si Weng et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2019)

Article Engineering, Electrical & Electronic

Secure data sharing scheme for VANETs based on edge computing

Jingwen Pan et al.

EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING (2019)

Proceedings Paper Computer Science, Information Systems

Identity-Based Broadcast Encryption with Outsourced Partial Decryption for Hybrid Security Models in Edge Computing

Jongkil Kim et al.

PROCEEDINGS OF THE 2019 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS '19) (2019)

Proceedings Paper Transportation Science & Technology

DrivMan: Driving Trust Management and Data Sharing in VANETs with Blockchain and Smart Contracts

Uzair Javaid et al.

2019 IEEE 89TH VEHICULAR TECHNOLOGY CONFERENCE (VTC2019-SPRING) (2019)

Article Computer Science, Theory & Methods

Data sharing in VANETs based on evolutionary fuzzy game

Jianhua Liu et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Information Systems

Identity-based broadcast encryption with continuous leakage resilience

Jiguo Li et al.

INFORMATION SCIENCES (2018)

Article Computer Science, Artificial Intelligence

Efficient certificateless anonymous multi-receiver encryption scheme for mobile devices

Debiao He et al.

SOFT COMPUTING (2017)

Article Computer Science, Information Systems

Concurrently deniable ring authentication and its application to LBS in VANETs

Shengke Zeng et al.

PEER-TO-PEER NETWORKING AND APPLICATIONS (2017)

Article Computer Science, Information Systems

Efficient Anonymous Multireceiver Certificateless Encryption

Ying-Hao Hung et al.

IEEE SYSTEMS JOURNAL (2017)

Article Computer Science, Hardware & Architecture

Proxy Re-Encryption: Analysis of constructions and its application to secure access delegation

David Nunez et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2017)

Article Computer Science, Information Systems

Data communication in VANETs: Protocols, applications and challenges

Felipe Cunha et al.

AD HOC NETWORKS (2016)

Article Computer Science, Information Systems

A Survey of Proxy Re-Encryption for Secure Data Sharing in Cloud Computing

Zhiguang Qin et al.

IEEE Transactions on Services Computing (2016)

Article Computer Science, Theory & Methods

Adaptively Secure Identity-Based Broadcast Encryption With a Constant-Sized Ciphertext

Jongkil Kim et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)