相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。Swarm of UAVs for Network Management in 6G: A Technical Review
Muhammad Asghar Khan et al.
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2023)
ID-CEPPA: Identity-based Computationally Efficient Privacy-Preserving Authentication scheme for vehicle-to-vehicle communications
Udit Bansal et al.
JOURNAL OF SYSTEMS ARCHITECTURE (2022)
An Efficient and Secure Multimessage and Multireceiver Signcryption Scheme for Edge-Enabled Internet of Vehicles
Insaf Ullah et al.
IEEE INTERNET OF THINGS JOURNAL (2022)
A Provable and Privacy-Preserving Authentication Scheme for UAV-Enabled Intelligent Transportation Systems
Muhammad Asghar Khan et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2022)
ECCHSC: Computationally and Bandwidth Efficient ECC-Based Hybrid Signcryption Protocol for Secure Heterogeneous Vehicle-to-Infrastructure Communications
Ikram Ali et al.
IEEE INTERNET OF THINGS JOURNAL (2022)
An efficient signcryption of heterogeneous systems for Internet of Vehicles
Ahmed Elkhalil et al.
JOURNAL OF SYSTEMS ARCHITECTURE (2021)
An efficient heterogeneous blockchain-based online/offline signcryption systems for internet of vehicles
Ahmed Elkhalil et al.
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2021)
An Efficient and Secure Certificate-Based Access Control and Key Agreement Scheme for Flying Ad-Hoc Networks
Muhammad Asghar Khan et al.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2021)
Drones in Distress: A Game-Theoretic Countermeasure for Protecting UAVs Against GPS Spoofing
AbdelRahman Eldosouky et al.
IEEE INTERNET OF THINGS JOURNAL (2020)
An Efficient Hybrid Signcryption Scheme With Conditional Privacy-Preservation for Heterogeneous Vehicular Communication in VANETs
Ikram Ali et al.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2020)
An Efficient and Provably Secure Certificateless Key-Encapsulated Signcryption Scheme for Flying Ad-hoc Network
Muhammad Asghar Khan et al.
IEEE ACCESS (2020)
Secure Smart Cameras by Aggregate-Signcryption with Decryption Fairness for Multi-Receiver IoT Applications
Subhan Ullah et al.
SENSORS (2019)
A survey on internet of vehicles: Applications, security issues & solutions
Surbhi Sharma et al.
VEHICULAR COMMUNICATIONS (2019)
Provably Secure Identity-Based Signcryption Scheme for Crowdsourced Industrial Internet of Things Environments
Arijit Karati et al.
IEEE INTERNET OF THINGS JOURNAL (2018)
A certificateless aggregate signature scheme for healthcare wireless sensor network
Pankaj Kumar et al.
SUSTAINABLE COMPUTING-INFORMATICS & SYSTEMS (2018)
Provable secure lightweight hyper elliptic curve-based communication system for wireless sensor networks
Vankamamidi S. Naresh et al.
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2018)
A Practical Evaluation on RSA and ECC-Based Cipher Suites for IoT High-Security Energy-Efficient Fog and Mist Computing Devices
Manuel Suarez-Albela et al.
SENSORS (2018)
Certificateless Key-Insulated Generalized Signcryption Scheme without Bilinear Pairings
Caixue Zhou et al.
SECURITY AND COMMUNICATION NETWORKS (2017)
On the Design of Provably Secure Lightweight Remote User Authentication Scheme for Mobile Cloud Computing Services
Sandip Roy et al.
IEEE ACCESS (2017)
Privacy-preserving data aggregation scheme against internal attackers in smart grids
Debiao He et al.
WIRELESS NETWORKS (2016)
A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends
Yulong Zou et al.
PROCEEDINGS OF THE IEEE (2016)
Bayesian Coalition Game for Contention-Aware Reliable Data Forwarding in Vehicular Mobile Cloud
Neeraj Kumar et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2015)
Obtain confidentiality or/and authenticity in Big Data by ID-based generalized signcryption
Guiyi Wei et al.
INFORMATION SCIENCES (2015)
An intelligent approach for building a secure decentralized public key infrastructure in VANET
Neeraj Kumar et al.
JOURNAL OF COMPUTER AND SYSTEM SCIENCES (2015)
An efficient signcryption scheme with key privacy and its extension to ring signcryption
Chung Li et al.
JOURNAL OF COMPUTER SECURITY (2010)