CPPA-D: Efficient Conditional Privacy-Preserving Authentication Scheme With Double-Insurance in VANETs
暂无分享,去创建一个
Fan Zhou | Xiaonan Luo | Yujue Wang | Wanjun Xiong | Ruomei Wang | Xiaonan Luo | Fan Zhou | Yujue Wang | Ruomei Wang | Wanjun Xiong
[1] Pandi Vijayakumar,et al. EAAP: Efficient Anonymous Authentication With Conditional Privacy-Preserving Scheme for Vehicular Ad Hoc Networks , 2017, IEEE Transactions on Intelligent Transportation Systems.
[2] Baowen Xu,et al. An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks , 2015, IEEE Transactions on Information Forensics and Security.
[3] Markus G. Kuhn,et al. Tamper resistance: a cautionary note , 1996 .
[4] Cheng-Chi Lee,et al. Toward a secure batch verification with group testing for VANET , 2013, Wirel. Networks.
[5] Dijiang Huang,et al. PACP: An Efficient Pseudonymous Authentication-Based Conditional Privacy Protocol for VANETs , 2011, IEEE Transactions on Intelligent Transportation Systems.
[6] Yimin Wang,et al. ECPB: Efficient Conditional Privacy-Preserving Authentication Scheme Supporting Batch Verification for VANETs , 2016, Int. J. Netw. Secur..
[7] C. P. Schnorr,et al. Efficient Identification and Signatures for Smart Cards (Abstract) , 1989, EUROCRYPT.
[8] Zhiyi Fang,et al. Securing Vehicular Ad Hoc Networks , 2007, 2007 2nd International Conference on Pervasive Computing and Applications.
[9] Pingzhi Fan,et al. b-SPECS+: Batch Verification for Secure Pseudonymous Authentication in VANET , 2013, IEEE Transactions on Information Forensics and Security.
[10] Pascal Lorenz,et al. Decentralized and Scalable Privacy-Preserving Authentication Scheme in VANETs , 2018, IEEE Transactions on Vehicular Technology.
[11] Shi-Jinn Horng,et al. Enhancing Security and Privacy for Identity-Based Batch Verification Scheme in VANETs , 2017, IEEE Transactions on Vehicular Technology.
[12] Andrew S. Tanenbaum,et al. An Identity-based Ring Signature Scheme with Enhanced Privacy , 2006, 2006 Securecomm and Workshops.
[13] Victor I. Chang,et al. Computationally efficient privacy preserving anonymous mutual and batch authentication schemes for vehicular ad hoc networks , 2018, Future Gener. Comput. Syst..
[14] Joonsang Baek,et al. Efficient online/offline identity-based signature for wireless sensor network , 2010, International Journal of Information Security.
[15] Ye Zhang,et al. Vehicular Ad Hoc Network Representation Learning for Recommendations in Internet of Things , 2020, IEEE Transactions on Industrial Informatics.
[16] Pin-Han Ho,et al. An Efficient Identity-Based Batch Verification Scheme for Vehicular Sensor Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[17] Jia-Lun Tsai,et al. An Efficient Conditional Privacy-Preserving Authentication Scheme for Vehicular Sensor Networks Without Pairings , 2016, IEEE Transactions on Intelligent Transportation Systems.
[18] Srivaths Ravi,et al. Tamper resistance mechanisms for secure embedded systems , 2004, 17th International Conference on VLSI Design. Proceedings..
[19] Xiaodong Lin,et al. A Threshold Anonymous Authentication Protocol for VANETs , 2016, IEEE Transactions on Vehicular Technology.
[20] Mianxiong Dong,et al. Private and Flexible Urban Message Delivery , 2016, IEEE Transactions on Vehicular Technology.
[21] Hung-Yu Chien,et al. ABAKA: An Anonymous Batch Authenticated and Key Agreement Scheme for Value-Added Services in Vehicular Ad Hoc Networks , 2011, IEEE Transactions on Vehicular Technology.
[22] Ashutosh Saxena,et al. A dynamic ID-based remote user authentication scheme , 2004, IEEE Transactions on Consumer Electronics.
[23] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[24] Huiyong Wang,et al. Privacy-Preserving Cloud-Based Road Condition Monitoring With Source Authentication in VANETs , 2019, IEEE Transactions on Information Forensics and Security.
[25] Dong Hoon Lee,et al. Reliable Cooperative Authentication for Vehicular Networks , 2018, IEEE Transactions on Intelligent Transportation Systems.
[26] Srdjan Capkun,et al. The security and privacy of smart vehicles , 2004, IEEE Security & Privacy Magazine.