A low computation message delivery and authentication VANET protocol
暂无分享,去创建一个
[1] Mahmood Fathy,et al. Vehicular Ad Hoc Networks: Current Issues and Future Challenges , 2011, AdHocNets 2011.
[2] Shih-Wei Huang,et al. Strongly Privacy-Preserving Communication Protocol for VANETs , 2014, 2014 Ninth Asia Joint Conference on Information Security.
[3] Kishwer Abdul Khaliq,et al. VANET Security Analysis on the Basis of Attacks in Authentication , 2016, LDIC.
[4] Mohamed Hamdi,et al. A new group Diffie-Hellman key generation proposal for secure VANET communications , 2016, 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC).
[5] Panagiotis Papadimitratos,et al. SECURING VEHICULAR COMMUNICATIONS , 2006, IEEE Wireless Communications.
[6] M. Milton Joe,et al. Review of vehicular ad hoc network communication models including WVANET (Web VANET) model and WVANET future research directions , 2016, Wirel. Networks.
[7] P. Mohan Kumar,et al. Vehicular Ad Hoc Networks (VANET): Architectures, methodologies and design issues , 2016, 2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM).
[8] Abdelhamid Mellouk,et al. Bio‐Inspired Routing Protocols for VANETs , 2014 .
[9] Shahnawaj Khan. Region Authority ( RA ) Collaborated Certificate Organization and Management in VANET , 2014 .
[10] D. Manivannan,et al. RIVER: A reliable inter-vehicular routing protocol for vehicular ad hoc networks , 2012, Comput. Networks.
[11] Nilesh Patel,et al. Signal Strength Based Route Selection in MANETs , 2012 .
[12] S. Godse,et al. VANET : A Survey on Secure Routing , 2015 .
[13] Yonghong Chen,et al. A novel secure message delivery and authentication method for vehicular ad hoc networks , 2016, 2016 First IEEE International Conference on Computer Communication and the Internet (ICCCI).
[14] R. Mollin. RSA and Public-Key Cryptography , 2002 .
[15] A. Kondracki,et al. The Chinese Remainder Theorem , 2019, Certain Number-Theoretic Episodes in Algebra.
[16] Hussein Zedan,et al. A comprehensive survey on vehicular Ad Hoc network , 2014, J. Netw. Comput. Appl..
[17] Mahamod Ismail,et al. Vehicular communication ad hoc routing protocols: A survey , 2014, J. Netw. Comput. Appl..
[18] Brijesh Kumar Chaurasia,et al. Infrastructure based Authentication in VANETs , 2011 .
[19] Sudip Misra,et al. Security in Vehicular Ad Hoc Networks , 2016 .
[20] Huirong Fu,et al. Privacy-by-Decoy: Protecting location privacy against collusion and deanonymization in vehicular location based services , 2014, 2014 IEEE Intelligent Vehicles Symposium Proceedings.
[21] Pin-Han Ho,et al. GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications , 2007, IEEE Transactions on Vehicular Technology.
[22] Jian Shen,et al. EIAS-CP: new efficient identity-based authentication scheme with conditional privacy-preserving for VANETs , 2016, Telecommunication Systems.
[23] Sunilkumar S. Manvi,et al. A survey on authentication schemes in VANETs for secured communication , 2017, Veh. Commun..
[24] Amir Hossein Jahangir,et al. Analysis of TESLA protocol in vehicular ad hoc networks using timed colored Petri nets , 2015, 2015 6th International Conference on Information and Communication Systems (ICICS).
[25] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[26] Kenneth P. Laberteaux,et al. STRONG VANET SECURITY ON A BUDGET , 2006 .
[27] G. Shanmugasundaram,et al. A Multilevel Clustering Using Multi-hop and Multihead in VANET , 2017 .
[29] D. Manivannan,et al. An efficient protocol for authenticated and secure message delivery in vehicular ad hoc networks , 2016, Veh. Commun..
[30] S. Supriya,et al. EFFICIENT PRIVACY PRESERVING AUTHENTICATION FOR VEHICULAR AD-HOC NETWORKS , 2015 .
[31] Prashant Johri,et al. Security Challenges, Authentication, Application and Trust Models for Vehicular Ad Hoc Network- A Survey , 2017 .