CreditCoin: A Privacy-Preserving Blockchain-Based Incentive Announcement Network for Communications of Smart Vehicles
暂无分享,去创建一个
Xiangliang Zhang | Zonghua Zhang | Jiqiang Liu | Lun Li | Lichen Cheng | Shuo Qiu | Wei Wang | Xiangliang Zhang | Zonghua Zhang | Jiqiang Liu | Wei Wang | Shuo Qiu | Lun Li | Lichen Cheng
[1] Song Guo,et al. A Game Theoretical Incentive Scheme for Relay Selection Services in Mobile Social Networks , 2016, IEEE Transactions on Vehicular Technology.
[2] Patrick Weber,et al. OpenStreetMap: User-Generated Street Maps , 2008, IEEE Pervasive Computing.
[3] Jacques Stern,et al. Threshold Ring Signatures and Applications to Ad-hoc Groups , 2002, CRYPTO.
[4] Bo Yu,et al. Detecting Sybil attacks in VANETs , 2013, J. Parallel Distributed Comput..
[5] Josep Domingo-Ferrer,et al. Trustworthy Privacy-Preserving Car-Generated Announcements in Vehicular Ad Hoc Networks , 2009, IEEE Transactions on Vehicular Technology.
[6] Alfred Menezes,et al. The Elliptic Curve Digital Signature Algorithm (ECDSA) , 2001, International Journal of Information Security.
[7] Leslie Lamport,et al. The Byzantine Generals Problem , 1982, TOPL.
[8] Satoshi Nakamoto. Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .
[9] Aniket Kate,et al. Introduction to Credit Networks: Security, Privacy, and Applications , 2016, CCS.
[10] Matthew Green,et al. Accountable Privacy for Decentralized Anonymous Payments , 2016, Financial Cryptography.
[11] Ghassan O. Karame,et al. Ripple: Overview and Outlook , 2015, TRUST.
[12] Sven Lachmund,et al. Proving Reliability of Anonymous Information in VANETs , 2009, IEEE Transactions on Vehicular Technology.
[13] Pandi Vijayakumar,et al. EAAP: Efficient Anonymous Authentication With Conditional Privacy-Preserving Scheme for Vehicular Ad Hoc Networks , 2017, IEEE Transactions on Intelligent Transportation Systems.
[14] Eli Ben-Sasson,et al. Zerocash: Decentralized Anonymous Payments from Bitcoin , 2014, 2014 IEEE Symposium on Security and Privacy.
[15] Adi Shamir,et al. How to share a secret , 1979, CACM.
[16] Rui Zhang,et al. An IBE scheme using ECC combined public key , 2010, Comput. Electr. Eng..
[17] Josep Domingo-Ferrer,et al. APPA: Aggregate Privacy-Preserving Authentication in Vehicular Ad Hoc Networks , 2011, ISC.
[18] Mauro Conti,et al. Fast and Secure Multihop Broadcast Solutions for Intervehicular Communication , 2014, IEEE Transactions on Intelligent Transportation Systems.
[19] Hannes Hartenstein,et al. A tutorial survey on vehicular ad hoc networks , 2008, IEEE Communications Magazine.
[20] Steven E. Shladover,et al. Potential Cyberattacks on Automated Vehicles , 2015, IEEE Transactions on Intelligent Transportation Systems.
[21] Huirong Fu,et al. Privacy Issues of Vehicular Ad-Hoc Networks , 2010 .
[22] Siaw-Lynn Ng,et al. Threshold Anonymous Announcement in VANETs , 2011, IEEE Journal on Selected Areas in Communications.
[23] Hannes Federrath,et al. VANETsim: An open source simulator for security and privacy concepts in VANETs , 2014, 2014 International Conference on High Performance Computing & Simulation (HPCS).
[24] Leslie Lamport,et al. Reaching Agreement in the Presence of Faults , 1980, JACM.
[25] Feng Xia,et al. CAIS: A Copy Adjustable Incentive Scheme in Community-Based Socially Aware Networking , 2017, IEEE Transactions on Vehicular Technology.
[26] David M. Pennock,et al. Mechanism Design on Trust Networks , 2007, WINE.
[27] David Schwartz,et al. The Ripple Protocol Consensus Algorithm , 2014 .
[28] Alejandro Quintero,et al. VANET security surveys , 2014, Comput. Commun..
[29] Adrian Perrig,et al. Challenges in Securing Vehicular Networks , 2005 .
[30] Andreas M. Antonopoulos,et al. Mastering Bitcoin: Unlocking Digital Crypto-Currencies , 2014 .
[31] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[32] Xiaodong Lin,et al. A Threshold Anonymous Authentication Protocol for VANETs , 2016, IEEE Transactions on Vehicular Technology.
[33] Josep Domingo-Ferrer,et al. Balanced Trustworthiness, Safety, and Privacy in Vehicle-to-Vehicle Communications , 2010, IEEE Transactions on Vehicular Technology.
[34] Ralph C. Merkle,et al. A Certified Digital Signature , 1989, CRYPTO.
[35] Xuelong Li,et al. Adaptive Multimedia Data Forwarding for Privacy Preservation in Vehicular Ad-Hoc Networks , 2017, IEEE Transactions on Intelligent Transportation Systems.
[36] Maxim Raya,et al. Efficient secure aggregation in VANETs , 2006, VANET '06.
[37] Ralph C. Merkle,et al. Protocols for Public Key Cryptosystems , 1980, 1980 IEEE Symposium on Security and Privacy.
[38] Josep Domingo-Ferrer,et al. Distributed Privacy-Preserving Secure Aggregation in Vehicular Communication , 2011, 2011 Third International Conference on Intelligent Networking and Collaborative Systems.
[39] Xiaodong Lin. LSR: Mitigating Zero-Day Sybil Vulnerability in Privacy-Preserving Vehicular Peer-to-Peer Networks , 2013, IEEE Journal on Selected Areas in Communications.
[40] Josep Domingo-Ferrer,et al. Aggregation of Trustworthy Announcement Messages in Vehicular Ad Hoc Networks , 2009, VTC Spring 2009 - IEEE 69th Vehicular Technology Conference.
[41] Mianxiong Dong,et al. Game Theoretic Resource Allocation in Media Cloud With Mobile Social Users , 2016, IEEE Transactions on Multimedia.
[42] Earl T. Barr,et al. TrustDavis: a non-exploitable online reputation system , 2005, Seventh IEEE International Conference on E-Commerce Technology (CEC'05).
[43] Lein Harn,et al. An Efficient Threshold Anonymous Authentication Scheme for Privacy-Preserving Communications , 2013, IEEE Transactions on Wireless Communications.
[44] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[45] Yan Wang,et al. Incentive Based Data Sharing in Delay Tolerant Mobile Networks , 2014, IEEE Transactions on Wireless Communications.