4.6 Article

An efficient anonymous authentication protocol using batch operations for VANETs

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Engineering, Electrical & Electronic

Enhancing Security and Privacy for Identity-Based Batch Verification Scheme in VANETs

Shiang-Feng Tzeng et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2017)

Article Telecommunications

A survey on position-based routing for vehicular ad hoc networks

Jianqi Liu et al.

TELECOMMUNICATION SYSTEMS (2016)

Article Computer Science, Hardware & Architecture

An effective dynamic spectrum access algorithm for multi-hop cognitive wireless networks

Dingde Jiang et al.

COMPUTER NETWORKS (2015)

Article Computer Science, Hardware & Architecture

NextCell: Predicting Location Using Social Interplay from Cell Phone Traces

Daqiang Zhang et al.

IEEE TRANSACTIONS ON COMPUTERS (2015)

Article Computer Science, Theory & Methods

An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks

Debiao He et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)

Article Engineering, Electrical & Electronic

Message Authentication Using Proxy Vehicles in Vehicular Ad Hoc Networks

Yiliang Liu et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2015)

Article Computer Science, Information Systems

Anonymous and provably secure certificateless multireceiver encryption without bilinear pairing

S. K. Hafizul Islam et al.

SECURITY AND COMMUNICATION NETWORKS (2015)

Article Computer Science, Information Systems

VANET security surveys

Richard Gilles Engoulou et al.

COMPUTER COMMUNICATIONS (2014)

Article Engineering, Electrical & Electronic

Context-Aware Vehicular Cyber-Physical Systems with Cloud Support: Architecture, Challenges, and Solutions

Jiafu Wan et al.

IEEE COMMUNICATIONS MAGAZINE (2014)

Article Computer Science, Hardware & Architecture

BASA: Building Mobile Ad-hoc Social Networks on Top of Android

Daqiang Zhang et al.

IEEE NETWORK (2014)

Article Computer Science, Hardware & Architecture

VSPN: VANET-Based Secure and Privacy-Preserving Navigation

T. W. Chim et al.

IEEE TRANSACTIONS ON COMPUTERS (2014)

Article Computer Science, Hardware & Architecture

MOBILITY PREDICTION IN TELECOM CLOUD USING MOBILE CALLS

Daqiang Zhang et al.

IEEE WIRELESS COMMUNICATIONS (2014)

Article Computer Science, Information Systems

εIBAS: An efficient identity-based broadcast authentication scheme in wireless sensor networks

Kyung-Ah Shim et al.

AD HOC NETWORKS (2013)

Article Computer Science, Theory & Methods

b-SPECS plus : Batch Verification for Secure Pseudonymous Authentication in VANET

Shi-Jinn Horng et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2013)

Article Engineering, Electrical & Electronic

CPAS: An Efficient Conditional Privacy-Preserving Authentication Scheme for Vehicular Sensor Networks

Kyung-Ah Shim

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2012)

Article Computer Science, Information Systems

SPECS: Secure and privacy enhancing communications schemes for VANETs

T. W. Chim et al.

AD HOC NETWORKS (2011)

Article Engineering, Electrical & Electronic

ABAKA: An Anonymous Batch Authenticated and Key Agreement Scheme for Value-Added Services in Vehicular Ad Hoc Networks

Jiun-Long Huang et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2011)

Article Computer Science, Information Systems

A survey and challenges in routing and data dissemination in vehicular ad hoc networks

Wai Chen et al.

WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2011)

Article Engineering, Electrical & Electronic

Multi-User Broadcast Authentication in Wireless Sensor Networks

Kui Ren et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2009)

Article Engineering, Electrical & Electronic

Fingerprint Biometric-based Self-Authentication and Deniable Authentication Schemes for the Electronic World

Muhammad Khurram Khan

IETE TECHNICAL REVIEW (2009)

Article Engineering, Electrical & Electronic

A tutorial survey on vehicular ad hoc networks

Hannes Hartenstein et al.

IEEE COMMUNICATIONS MAGAZINE (2008)

Article Engineering, Electrical & Electronic

Security in vehicular ad hoc networks

Xiaodong Lin et al.

IEEE COMMUNICATIONS MAGAZINE (2008)

Article Computer Science, Theory & Methods

Efficient pairing computation on supersingular Abelian varieties

Paulo S. L. M. Barreto et al.

DESIGNS CODES AND CRYPTOGRAPHY (2007)

Article Computer Science, Hardware & Architecture

Design of 5.9 GHz DSRC-based vehicular safety communication

Daniel Jiang et al.

IEEE WIRELESS COMMUNICATIONS (2006)

Article Computer Science, Theory & Methods

Security arguments for digital signatures and blind signatures

D Pointcheval et al.

JOURNAL OF CRYPTOLOGY (2000)