An efficient message access quality model in vehicular communication networks
暂无分享,去创建一个
Luming Zhang | Xuejiao Liu | Zhenyu Shan | Wei Ye | Ruoyu Yan | W. Ye | Luming Zhang | Zhenyu Shan | Xuejiao Liu | Ruoyu Yan
[1] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[2] Dijiang Huang,et al. ASPE: attribute-based secure policy enforcement in vehicular ad hoc networks , 2009, Ad Hoc Networks.
[3] Xiao Liu,et al. Fast multi-view segment graph kernel for object classification , 2013, Signal Process..
[4] Jianqing Zhang,et al. Toward content-centric privacy in ICN: attribute-based encryption and routing , 2013, SIGCOMM 2013.
[5] Pin-Han Ho,et al. Secure Vehicular Communications Based on Group Signature and ID-Based Signature Scheme , 2007, 2007 IEEE International Conference on Communications.
[6] Manoj Prabhakaran,et al. Attribute-Based Signatures , 2011, CT-RSA.
[7] Ivan Stojmenovic,et al. Improved Access Control Mechanism in Vehicular Ad Hoc Networks , 2011, ADHOC-NOW.
[8] Qinghua Li,et al. iHEMS: An information-centric approach to secure home energy management , 2012, 2012 IEEE Third International Conference on Smart Grid Communications (SmartGridComm).
[9] Xuejiao Liu,et al. Hierarchical Attribute-Based Access Control with Authentication for Outsourced Data in Cloud Computing , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.
[10] Gongjun Yan,et al. Towards Secure Vehicular Clouds , 2012, 2012 Sixth International Conference on Complex, Intelligent, and Software Intensive Systems.
[11] Eylem Ekici,et al. Vehicular Networking: A Survey and Tutorial on Requirements, Architectures, Challenges, Standards and Solutions , 2011, IEEE Communications Surveys & Tutorials.
[12] Yingjie Xia,et al. Parallelized Fusion on Multisensor Transportation Data: A Case Study in CyberITS , 2013, Int. J. Intell. Syst..
[13] Panagiotis Papadimitratos,et al. Efficient and robust pseudonymous authentication in VANET , 2007, VANET '07.
[14] Pin-Han Ho,et al. AEMA: An Aggregated Emergency Message Authentication Scheme for Enhancing the Security of Vehicular Ad Hoc Networks , 2008, 2008 IEEE International Conference on Communications.
[15] Yi Yang,et al. Discovering Discriminative Graphlets for Aerial Image Categories Recognition , 2013, IEEE Transactions on Image Processing.
[16] Xiaoyan Hong,et al. Situation-aware trust architecture for vehicular networks , 2010, IEEE Communications Magazine.
[17] Sushmita Ruj,et al. Privacy Preserving Access Control with Authentication for Securing Data in Clouds , 2012, 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (ccgrid 2012).
[18] Falko Dressler,et al. Vehicular Networking , 2014 .
[19] Kouichi Sakurai,et al. Realizing Fine-Grained and Flexible Access Control to Outsourced Data with Attribute-Based Cryptosystems , 2011, ISPEC.
[20] Wei Wu,et al. Quadtree-based domain decomposition for parallel map-matching on GPS data , 2012, 2012 15th International IEEE Conference on Intelligent Transportation Systems.
[21] Xiao Liu,et al. Probabilistic Graphlet Transfer for Photo Cropping , 2013, IEEE Transactions on Image Processing.
[22] Dong Hoon Lee,et al. Auditable and Privacy-Preserving Authentication in Vehicular Networks , 2008, 2008 The Second International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies.
[23] Rajkumar Buyya,et al. A survey on vehicular cloud computing , 2014, J. Netw. Comput. Appl..
[24] Taher ElGamal,et al. A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .
[25] Allison Bishop,et al. Decentralizing Attribute-Based Encryption , 2011, IACR Cryptol. ePrint Arch..
[26] Tao Zhang,et al. Probabilistic Adaptive Anonymous Authentication in Vehicular Networks , 2008, Journal of Computer Science and Technology.
[27] Yue Gao,et al. Representative Discovery of Structure Cues for Weakly-Supervised Image Segmentation , 2014, IEEE Transactions on Multimedia.