The Unified Butterfly Effect: Efficient Security Credential Management System for Vehicular Communications
暂无分享,去创建一个
Jefferson E. Ricardini | Marcos A. Simplício | Harsh Kupwade Patil | Eduardo Lopes Cominetti | Marcos V. M. Silva
[1] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[2] Scott A. Vanstone,et al. Provably Secure Implicit Certificate Schemes , 2002, Financial Cryptography.
[3] Kristin E. Lauter,et al. The Elliptic Curve Discrete Logarithm Problem and Equivalent Hard Problems for Elliptic Divisibility Sequences , 2008, Selected Areas in Cryptography.
[4] Jean-Sébastien Coron,et al. Universal Padding Schemes for RSA , 2002, CRYPTO.
[5] Khattab M. Ali Alheeti,et al. An intrusion detection system against malicious attacks on the communication network of driverless cars , 2015, 2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC).
[6] Eric R. Verheul,et al. Activate Later Certificates for V2X - Combining ITS efficiency with privacy , 2016, IACR Cryptol. ePrint Arch..
[7] Simon Josefsson,et al. Edwards-Curve Digital Signature Algorithm (EdDSA) , 2017, RFC.
[8] Jefferson E. Ricardini,et al. A privacy-preserving method for temporarily linking/revoking pseudonym certificates in vehicular networks , 2018, IACR Cryptol. ePrint Arch..
[9] Panagiotis Papadimitratos,et al. The Key to Intelligent Transportation: Identity and Credential Management in Vehicular Communication Systems , 2015, IEEE Vehicular Technology Magazine.
[10] Panagiotis Papadimitratos,et al. Vehicular communication systems: Enabling technologies, applications, and future outlook on intelligent transportation , 2009, IEEE Communications Magazine.
[11] Tanja Lange,et al. High-speed high-security signatures , 2011, Journal of Cryptographic Engineering.
[12] Frank Kargl,et al. PUCA: A pseudonym scheme with user-controlled anonymity for vehicular ad-hoc networks (VANET) , 2014, 2014 IEEE Vehicular Networking Conference (VNC).
[13] Mike Lukuc,et al. Vehicle-to-Vehicle Communications: Readiness of V2V Technology for Application , 2014 .
[14] William Whyte,et al. A security credential management system for V2V communications , 2013, 2013 IEEE Vehicular Networking Conference.
[15] William Whyte,et al. Binary hash tree based certificate access management for connected vehicles , 2017, WISEC.
[16] A. Iyer,et al. Secure V2V communications: Performance impact of computational overheads , 2008, IEEE INFOCOM Workshops 2008.
[17] Zhendong Ma,et al. Privacy Requirements in Vehicular Communication Systems , 2009, 2009 International Conference on Computational Science and Engineering.
[18] Luca Delgrossi,et al. IEEE 802.11p: Towards an International Standard for Wireless Access in Vehicular Environments , 2008, VTC Spring 2008 - IEEE Vehicular Technology Conference.
[19] H. Labiod,et al. Risk analysis study of ITS communication architecture , 2012, 2012 Third International Conference on The Network of the Future (NOF).
[20] Leslie Lamport,et al. Password authentication with insecure communication , 1981, CACM.
[21] Frank Kargl,et al. Pseudonym Schemes in Vehicular Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.
[22] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[23] Yuliang Zheng,et al. Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.