MDBV: Monitoring Data Batch Verification for Survivability of Internet of Vehicles
暂无分享,去创建一个
[1] Xiaojiang Du,et al. Security in wireless sensor networks , 2008, IEEE Wireless Communications.
[2] Kyung-Ah Shim,et al. EIBAS: An efficient identity-based broadcast authentication scheme in wireless sensor networks , 2013, Ad Hoc Networks.
[3] Yi Mu,et al. Certificateless Signatures: New Schemes and Security Models , 2012, Comput. J..
[4] Vipul Gupta,et al. Energy analysis of public-key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.
[5] Ming Yan. Certificateless Aggregate Signature Scheme , 2014 .
[6] Chen Hu,et al. Certificateless Aggregate Signature Scheme , 2010, 2010 International Conference on E-Business and E-Government.
[7] Chunhua Jin,et al. Secure and efficient data transmission in the Internet of Things , 2015, Telecommunication Systems.
[8] Jie Wu,et al. Defending Resource Depletion Attacks on Implantable Medical Devices , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[9] Zhi Guan,et al. An efficient certificateless aggregate signature with constant pairing computations , 2013, Inf. Sci..
[10] Mohsen Guizani,et al. Transactions papers a routing-driven Elliptic Curve Cryptography based key management scheme for Heterogeneous Sensor Networks , 2009, IEEE Transactions on Wireless Communications.
[11] He Liu,et al. A Secure and Efficient Certificateless Aggregate Signature Scheme , 2014, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[12] Jung Hee Cheon,et al. A New ID-based Signature with Batch Verification , 2004, IACR Cryptol. ePrint Arch..
[13] Jacques Stern,et al. Security Arguments for Digital Signatures and Blind Signatures , 2015, Journal of Cryptology.
[14] Kefei Chen,et al. An Adaptive Stable Link Selection Algorithm for Mobile Ad Hoc Networks , 2007 .
[15] Rajasekhar Mungara,et al. A Routing-Driven Elliptic Curve Cryptography based Key Management Scheme for Heterogeneous Sensor Networks , 2014 .
[16] Xiaojiang Du,et al. Biometric-based two-level secure access control for Implantable Medical Devices during emergencies , 2011, 2011 Proceedings IEEE INFOCOM.
[17] Debiao He,et al. A note on 'An efficient certificateless aggregate signature with constant pairing computations' , 2012, IACR Cryptol. ePrint Arch..
[18] Mohsen Guizani,et al. Secure and Efficient Time Synchronization in Heterogeneous Sensor Networks , 2008, IEEE Transactions on Vehicular Technology.
[19] Mohsen Guizani,et al. An effective key management scheme for heterogeneous sensor networks , 2007, Ad Hoc Networks.
[20] Athanasios V. Vasilakos,et al. Internet of Vehicles for E-Health Applications: A Potential Game for Optimal Network Capacity , 2017, IEEE Systems Journal.
[21] Niraj K. Jha,et al. A Comprehensive Study of Security of Internet-of-Things , 2017, IEEE Transactions on Emerging Topics in Computing.
[22] Marimuthu Palaniswami,et al. Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..
[23] Lei Zhang,et al. Efficient many-to-one authentication with certificateless aggregate signatures , 2010, Comput. Networks.
[24] Ch. Ramesh Babu,et al. Internet of Vehicles: From Intelligent Grid to Autonomous Cars and Vehicular Clouds , 2016 .
[25] Xiaojiang Du,et al. A Lightweight Multicast Authentication Mechanism for Small Scale IoT Applications , 2013, IEEE Sensors Journal.
[26] Xiaojiang Du,et al. A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..
[27] Robert H. Deng,et al. Anonymous Privacy-Preserving Task Matching in Crowdsourcing , 2018, IEEE Internet of Things Journal.
[28] Kefei Chen,et al. Two Certificateless Aggregate Signatures From Bilinear Maps , 2007, Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007).
[29] Chin-Teng Lin,et al. Internet of Vehicles: Motivation, Layered Architecture, Network Model, Challenges, and Future Aspects , 2016, IEEE Access.
[30] Wen Qiao-Yan,et al. Efficient and Provably-Secure Certificateless Aggregate Signature Scheme , 2013 .
[31] Xiaojiang Du,et al. VDAS: Verifiable data aggregation scheme for Internet of Things , 2017, 2017 IEEE International Conference on Communications (ICC).
[32] Baoyuan Kang,et al. A secure Certificateless Aggregate Signature Scheme , 2016 .
[33] Gwoboa Horng,et al. Certificateless aggregate signature with efficient verification , 2015, Secur. Commun. Networks.
[34] Kyung-Ah Shim,et al. A Secure Data Aggregation Scheme Based on Appropriate Cryptographic Primitives in Heterogeneous Wireless Sensor Networks , 2015, IEEE Transactions on Parallel and Distributed Systems.
[35] Xie Qi. Provably Secure Certificateless Aggregate Signature with Constant Length , 2012 .
[36] Hovav Shacham,et al. Aggregate and Verifiably Encrypted Signatures from Bilinear Maps , 2003, EUROCRYPT.
[37] Yasir Mehmood,et al. Internet-of-Things-Based Smart Cities: Recent Advances and Challenges , 2017, IEEE Communications Magazine.
[38] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[39] Wenjing Lou,et al. On Broadcast Authentication in Wireless Sensor Networks , 2007 .
[40] Mohsen Guizani,et al. Internet-of-things-based smart environments: state of the art, taxonomy, and open research challenges , 2016, IEEE Wireless Communications.
[41] Mohsen Guizani,et al. Internet of Things Architecture: Recent Advances, Taxonomy, Requirements, and Open Challenges , 2017, IEEE Wireless Communications.