A Novel RSU-Based Message Authentication Scheme for VANET
暂无分享,去创建一个
Wu Hsin-Te | Wei-Shuo Li | Su Tung-Shih | Wen-Shyong Hsiehz | Wu Hsin-Te | Wei-Shuo Li | Su Tung-Shih | Wen-Shyong Hsiehz
[1] Pin-Han Ho,et al. An Efficient Message Authentication Scheme for Vehicular Communications , 2008, IEEE Transactions on Vehicular Technology.
[2] Pin-Han Ho,et al. ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[3] Hannes Hartenstein,et al. A tutorial survey on vehicular ad hoc networks , 2008, IEEE Communications Magazine.
[4] Pin-Han Ho,et al. TSVC: timed efficient and secure vehicular communications with privacy preserving , 2008, IEEE Transactions on Wireless Communications.
[5] Pin-Han Ho,et al. GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications , 2007, IEEE Transactions on Vehicular Technology.
[6] Pin-Han Ho,et al. An Efficient Identity-Based Batch Verification Scheme for Vehicular Sensor Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[7] Maxim Raya,et al. The security of vehicular ad hoc networks , 2005, SASN '05.
[8] Srdjan Capkun,et al. The security and privacy of smart vehicles , 2004, IEEE Security & Privacy Magazine.
[9] Sven Lachmund,et al. Proving Reliability of Anonymous Information in VANETs , 2009, IEEE Transactions on Vehicular Technology.
[10] Amer Aijaz,et al. Attacks on Inter Vehicle Communication Systems-an Analysis , 2005 .
[11] J. David Irwin,et al. Reducing Communication Overhead for Wireless Roaming Authentication: Methods and Performance Evaluation , 2008, Int. J. Netw. Secur..
[12] Anis Laouiti,et al. Vehicle Ad Hoc networks: applications and related technical issues , 2008, IEEE Communications Surveys & Tutorials.
[13] Brian Tung,et al. Kerberos: A Network Authentication System , 1999 .
[14] Songwu Lu,et al. Secure Incentives for Commercial Ad Dissemination in Vehicular Networks , 2012, IEEE Trans. Veh. Technol..
[15] Tamar Frankel. [The theory and the practice...]. , 2001, Tijdschrift voor diergeneeskunde.
[16] Markus Jakobsson,et al. Balancing auditability and privacy in vehicular networks , 2005, Q2SWinet '05.
[17] Thomas Nowey,et al. Towards a security architecture for vehicular ad hoc networks , 2006, First International Conference on Availability, Reliability and Security (ARES'06).