Blockchain-Based Dynamic Key Management for Heterogeneous Intelligent Transportation Systems
暂无分享,去创建一个
Zhili Sun | Ao Lei | Haitham Cruickshank | Yue Cao | Philip Asuquo | Chibueze P. Anyigor Ogah | Chibueze P. Anyigor Ogah | Zhili Sun | Yue Cao | H. Cruickshank | C. P. A. Ogah | P. Asuquo | Ao Lei
[1] Haitham S. Cruickshank,et al. Scalable balanced batch rekeying for secure group communication , 2006, Comput. Secur..
[2] Mohsen Guizani,et al. Handover authentication for mobile networks: security and efficiency aspects , 2015, IEEE Network.
[3] Zhili Sun,et al. A Secure Key Management Scheme for Heterogeneous Secure Vehicular Communication Systems , 2016 .
[4] Alex Pentland,et al. Decentralizing Privacy: Using Blockchain to Protect Personal Data , 2015, 2015 IEEE Security and Privacy Workshops.
[5] Mohamed G. Gouda,et al. Secure group communications using key graphs , 1998, SIGCOMM '98.
[6] Mohsen Guizani,et al. A framework for a distributed key management scheme in heterogeneous wireless sensor networks , 2008, IEEE Trans. Wirel. Commun..
[7] Panagiotis Papadimitratos,et al. Secure vehicular communication systems: design and architecture , 2008, IEEE Communications Magazine.
[8] Bingpeng Zhou,et al. On the Spatial Error Propagation Characteristics of Cooperative Localization in Wireless Networks , 2017, IEEE Transactions on Vehicular Technology.
[9] Yue Cao,et al. An Electric Vehicle Charging Management Scheme Based on Publish/Subscribe Communication Framework , 2016, IEEE Systems Journal.
[10] Christian Decker,et al. Information propagation in the Bitcoin network , 2013, IEEE P2P 2013 Proceedings.
[11] Enzo Baccarelli,et al. Q*: Energy and delay-efficient dynamic queue management in TCP/IP virtualized data centers , 2017, Comput. Commun..
[12] Wei Yu,et al. Towards experimental evaluation of intelligent Transportation System safety and traffic efficiency , 2015, 2015 IEEE International Conference on Communications (ICC).
[13] Houbing Song,et al. ICMDS: Secure inter-cluster multiple-key distribution scheme for wireless sensor networks , 2017, Ad Hoc Networks.
[14] K. J. Ray Liu,et al. A scalable multicast key management scheme for heterogeneous wireless networks , 2004, IEEE/ACM Transactions on Networking.
[15] Enzo Baccarelli,et al. Energy-Efficient Adaptive Resource Management for Real-Time Vehicular Cloud Services , 2019, IEEE Transactions on Cloud Computing.
[16] Ning Wang,et al. Software Defined Networking With Pseudonym Systems for Secure Vehicular Clouds , 2016, IEEE Access.
[17] Xiaozhou Li,et al. Batch rekeying for secure group communications , 2001, WWW '01.
[18] A. Varga,et al. THE OMNET++ DISCRETE EVENT SIMULATION SYSTEM , 2003 .
[19] Huanling Wang,et al. Local Stereo Matching Based on Support Weight With Motion Flow for Dynamic Scene , 2016, IEEE Access.
[20] Eric Harder,et al. Logical Key Hierarchy Protocol , 1999 .
[21] Hannes Hartenstein,et al. A tutorial survey on vehicular ad hoc networks , 2008, IEEE Communications Magazine.
[22] Andrew Lippman,et al. MedRec: Using Blockchain for Medical Data Access and Permission Management , 2016, 2016 2nd International Conference on Open and Big Data (OBD).
[23] Reinhard German,et al. Bidirectionally Coupled Network and Road Traffic Simulation for Improved IVC Analysis , 2011, IEEE Transactions on Mobile Computing.
[24] Alfred Menezes,et al. The Elliptic Curve Digital Signature Algorithm (ECDSA) , 2001, International Journal of Information Security.
[25] Alfred Menezes,et al. Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.
[26] Ralph C. Merkle,et al. A Digital Signature Based on a Conventional Encryption Function , 1987, CRYPTO.
[27] Qiong Huang,et al. User-Defined Privacy Grid System for Continuous Location-Based Services , 2015, IEEE Transactions on Mobile Computing.
[28] John B. Kenney,et al. Dedicated Short-Range Communications (DSRC) Standards in the United States , 2011, Proceedings of the IEEE.
[29] Edward A. Lee. Cyber Physical Systems: Design Challenges , 2008, 2008 11th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC).
[30] Insup Lee,et al. Cyber-physical systems: The next computing revolution , 2010, Design Automation Conference.
[31] Andreas M. Antonopoulos,et al. Mastering Bitcoin: Unlocking Digital Crypto-Currencies , 2014 .
[32] Haitham S. Cruickshank,et al. Geographic-Based Spray-and-Relay (GSaR): An Efficient Routing Scheme for DTNs , 2015, IEEE Transactions on Vehicular Technology.
[33] Davor Svetinovic,et al. Security and Privacy in Decentralized Energy Trading Through Multi-Signatures, Blockchain and Anonymous Messaging Streams , 2018, IEEE Transactions on Dependable and Secure Computing.
[34] Jiafu Wan,et al. A survey of Cyber-Physical Systems , 2011, 2011 International Conference on Wireless Communications and Signal Processing (WCSP).
[35] Xinyu Yang,et al. A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications , 2017, IEEE Internet of Things Journal.
[36] Chun Chen,et al. Secure and Efficient Handover Authentication Based on Bilinear Pairing Functions , 2012, IEEE Transactions on Wireless Communications.
[37] Luca Veltri,et al. A novel batch-based group key management protocol applied to the Internet of Things , 2013, Ad Hoc Networks.
[38] Omar Zakaria,et al. An efficient scalable batch-rekeying scheme for secure multicast communication using multiple logical key trees , 2014 .
[39] Panagiotis Papadimitratos,et al. SECURING VEHICULAR COMMUNICATIONS , 2006, IEEE Wireless Communications.
[40] George Danezis,et al. Centrally Banked Cryptocurrencies , 2015, NDSS.