A defense technique against misbehavior in VANETs based on threshold authentication
暂无分享,去创建一个
[1] Maxim Raya,et al. The security of vehicular ad hoc networks , 2005, SASN '05.
[2] Claus-Peter Schnorr,et al. Efficient signature generation by smart cards , 2004, Journal of Cryptology.
[3] Sean W. Smith,et al. Blacklistable anonymous credentials: blocking misbehaving users without ttps , 2007, CCS '07.
[4] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[5] Hariharan Krishnan,et al. Performance evaluation of safety applications over DSRC vehicular ad hoc networks , 2004, VANET '04.
[6] Jessica Staddon,et al. Detecting and correcting malicious data in VANETs , 2004, VANET '04.
[7] Shihua Zhu,et al. Power control and rate allocation in multirate wideband CDMA systems , 2000, 2000 IEEE Wireless Communications and Networking Conference. Conference Record (Cat. No.00TH8540).
[8] Thomas Nowey,et al. Towards a security architecture for vehicular ad hoc networks , 2006, First International Conference on Availability, Reliability and Security (ARES'06).
[9] Yuguang Fang,et al. An ID-based Framework Achieving Privacy and Non-Repudiation in Vehicular Ad Hoc Networks , 2007, MILCOM 2007 - IEEE Military Communications Conference.
[10] Reihaneh Safavi-Naini,et al. Dynamic k-Times Anonymous Authentication , 2005, ACNS.
[11] Maxim Raya,et al. Efficient secure aggregation in VANETs , 2006, VANET '06.
[12] Pin-Han Ho,et al. GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications , 2007, IEEE Transactions on Vehicular Technology.
[13] Kazue Sako,et al. k-Times Anonymous Authentication , 2009, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[14] Arati Baliga,et al. An identity-based security framework For VANETs , 2006, VANET '06.
[15] Zhiyi Fang,et al. Securing Vehicular Ad Hoc Networks , 2007, 2007 2nd International Conference on Pervasive Computing and Applications.
[16] Florian Hess,et al. Efficient Identity Based Signature Schemes Based on Pairings , 2002, Selected Areas in Cryptography.
[17] Tim Leinmüller,et al. Improved security in geographic ad hoc routing through autonomous position verification , 2006, VANET '06.
[18] Tim Leinmüller,et al. POSITION VERIFICATION APPROACHES FOR VEHICULAR AD HOC NETWORKS , 2006, IEEE Wireless Communications.
[19] Jan Camenisch,et al. Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials , 2002, CRYPTO.