Secure Key Agreement and Authentication Protocol for Message Confirmation in Vehicular Cloud Computing

[1]  Pin-Han Ho,et al.  GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications , 2007, IEEE Transactions on Vehicular Technology.

[2]  Ashok Kumar Das,et al.  LAKS-NVT: Provably Secure and Lightweight Authentication and Key Agreement Scheme Without Verification Table in Medical Internet of Things , 2020, IEEE Access.

[3]  Ashok Kumar Das,et al.  A Dynamic Privacy-Preserving Key Management Protocol for V2G in Social Internet of Things , 2019, IEEE Access.

[4]  Josep Domingo-Ferrer,et al.  Distributed Aggregate Privacy-Preserving Authentication in VANETs , 2017, IEEE Transactions on Intelligent Transportation Systems.

[5]  Debasis Das,et al.  Secure message confirmation scheme based on batch verification in vehicular cloud computing , 2019, Phys. Commun..

[6]  Shui Yu,et al.  An Efficient Privacy-Preserving Mutual Authentication Scheme for Secure V2V Communication in Vehicular Ad Hoc Network , 2019, IEEE Access.

[7]  Jie Cui,et al.  PA-CRT: Chinese Remainder Theorem Based Conditional Privacy-Preserving Authentication Scheme in Vehicular Ad-Hoc Networks , 2019, IEEE Transactions on Dependable and Secure Computing.

[8]  Vanga Odelu,et al.  Design of Lightweight Authentication and Key Agreement Protocol for Vehicular Ad Hoc Networks , 2017, IEEE Access.

[9]  YoungHo Park,et al.  A Secure Charging System for Electric Vehicles Based on Blockchain , 2019, Sensors.

[10]  Joel J. P. C. Rodrigues,et al.  AKM-IoV: Authenticated Key Management Protocol in Fog Computing-Based Internet of Vehicles Deployment , 2019, IEEE Internet of Things Journal.

[11]  Ping Wang,et al.  Zipf’s Law in Passwords , 2017, IEEE Transactions on Information Forensics and Security.

[12]  Mohammad Reza Aref,et al.  A secure authentication scheme for VANETs with batch verification , 2015, Wirel. Networks.

[13]  Jie Cui,et al.  Efficient conditional privacy-preserving and authentication scheme for secure service provision in VANET , 2016 .

[14]  YoungHo Park,et al.  A Secure Lightweight Three-Factor Authentication Scheme for IoT in Cloud Computing Environment , 2019, Sensors.

[15]  Jing Zhang,et al.  SPACF: A Secure Privacy-Preserving Authentication Scheme for VANET With Cuckoo Filter , 2017, IEEE Transactions on Vehicular Technology.

[16]  Danny Dolev,et al.  On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).

[17]  YoHan Park,et al.  Secure Three-Factor Authentication Protocol for Multi-Gateway IoT Environments , 2019, Sensors.

[18]  Yi Jiang,et al.  An Enhanced Privacy-Preserving Authentication Scheme for Vehicle Sensor Networks , 2017, Sensors.

[19]  Young-Ho Park,et al.  A Secure and Efficient Three-Factor Authentication Protocol in Global Mobility Networks , 2020, Applied Sciences.

[20]  Hwangjun Song,et al.  Security analysis and enhancements of an improved multi-factor biometric authentication scheme , 2017, Int. J. Distributed Sens. Networks.

[21]  Ashok Kumar Das,et al.  On the Design of Secure and Efficient Three-Factor Authentication Protocol Using Honey List for Wireless Sensor Networks , 2020, IEEE Access.

[22]  John B. Kenney,et al.  Dedicated Short-Range Communications (DSRC) Standards in the United States , 2011, Proceedings of the IEEE.

[23]  Cheng-Chi Lee,et al.  Toward a secure batch verification with group testing for VANET , 2013, Wirel. Networks.

[24]  Baowen Xu,et al.  An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks , 2015, IEEE Transactions on Information Forensics and Security.

[25]  Jeng-Farn Lee,et al.  TEAM: Trust-Extended Authentication Mechanism for Vehicular Ad Hoc Networks , 2011, IEEE Systems Journal.

[26]  Pin-Han Ho,et al.  On batch verification with group testing for vehicular communications , 2011, Wirel. Networks.

[27]  Sebastian Mödersheim,et al.  OFMC: A symbolic model checker for security protocols , 2005, International Journal of Information Security.

[28]  Chun Chen,et al.  Secure and Efficient Handover Authentication Based on Bilinear Pairing Functions , 2012, IEEE Transactions on Wireless Communications.

[29]  Tu Peng,et al.  A Realistic Distributed Conditional Privacy- Preserving Authentication Scheme for Vehicular Ad Hoc Networks , 2018, IEEE Access.