2FLIP: A Two-Factor Lightweight Privacy-Preserving Authentication Scheme for VANET
暂无分享,去创建一个
Liehuang Zhu | Hanwen Zhang | Fei Wang | Yongjun Xu | Yujun Zhang | Fei Wang | Yongjun Xu | Liehuang Zhu | Yujun Zhang | Hanwen Zhang
[1] Pin-Han Ho,et al. An Efficient Message Authentication Scheme for Vehicular Communications , 2008, IEEE Transactions on Vehicular Technology.
[2] Dawn Song,et al. The TESLA Broadcast Authentication Protocol , 2002 .
[3] Pin-Han Ho,et al. ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[4] Liehuang Zhu,et al. LESPP: lightweight and efficient strong privacy preserving authentication scheme for secure VANET communication , 2014, Computing.
[5] Ran Canetti,et al. Universally Composable Symbolic Analysis of Diffie-Hellman based Key Exchange , 2010, IACR Cryptol. ePrint Arch..
[6] Florian Hess,et al. Efficient Identity Based Signature Schemes Based on Pairings , 2002, Selected Areas in Cryptography.
[7] Amos Fiat,et al. Batch RSA , 1989, Journal of Cryptology.
[8] Panagiotis Papadimitratos,et al. Secure vehicular communication systems: design and architecture , 2008, IEEE Communications Magazine.
[9] Maxim Raya,et al. Securing vehicular ad hoc networks , 2007, J. Comput. Secur..
[10] Pin-Han Ho,et al. TSVC: timed efficient and secure vehicular communications with privacy preserving , 2008, IEEE Transactions on Wireless Communications.
[11] Adrian Perrig,et al. Flooding-resilient broadcast authentication for VANETs , 2011, MobiCom.
[12] Carlisle M. Adams,et al. User Authentication , 2005, Encyclopedia of Cryptography and Security.
[13] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[14] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[15] Jörg Ott,et al. The ONE simulator for DTN protocol evaluation , 2009, SimuTools.
[16] Panagiotis Papadimitratos,et al. Efficient and robust pseudonymous authentication in VANET , 2007, VANET '07.
[17] Mike Lukuc,et al. Vehicle-to-Vehicle Communications: Readiness of V2V Technology for Application , 2014 .
[18] Yehuda Lindell,et al. Introduction to Modern Cryptography , 2004 .
[19] Josep Domingo-Ferrer,et al. A Scalable Robust Authentication Protocol for Secure Vehicular Communications , 2010, IEEE Transactions on Vehicular Technology.
[20] Lee Armstrong,et al. DEDICATED SHORT RANGE COMMUNICATIONS (DSRC) HOME , 2002 .
[21] Hovav Shacham,et al. Short Group Signatures , 2004, CRYPTO.
[22] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[23] Adrian Perrig,et al. Flexible, extensible, and efficient VANET authentication , 2009, Journal of Communications and Networks.
[24] Jan Camenisch,et al. Batch Verification of Short Signatures , 2007, Journal of Cryptology.
[25] Pin-Han Ho,et al. An Efficient Identity-Based Batch Verification Scheme for Vehicular Sensor Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[26] Xiaohui Liang,et al. Pseudonym Changing at Social Spots: An Effective Strategy for Location Privacy in VANETs , 2012, IEEE Transactions on Vehicular Technology.
[27] R. Poovendran,et al. CARAVAN: Providing Location Privacy for VANET , 2005 .
[28] Ran Canetti,et al. Universally Composable Symbolic Analysis of Mutual Authentication and Key-Exchange Protocols , 2006, TCC.
[29] Joan Daemen,et al. AES Proposal : Rijndael , 1998 .
[30] Bruno Blanchet,et al. Automatic verification of correspondences for security protocols , 2008, J. Comput. Secur..
[31] Robert H. Deng,et al. A novel privacy preserving authentication and access control scheme for pervasive computing environments , 2006, IEEE Transactions on Vehicular Technology.
[32] Pin-Han Ho,et al. GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications , 2007, IEEE Transactions on Vehicular Technology.
[33] Liehuang Zhu,et al. Computationally sound symbolic security reduction analysis of the group key exchange protocols using bilinear pairings , 2012, Inf. Sci..
[34] Benoît Libert,et al. Multi-use unidirectional proxy re-signatures , 2008, CCS.
[35] Maxim Raya,et al. The security of vehicular ad hoc networks , 2005, SASN '05.
[36] Wenjing Lou,et al. Privacy-enhanced, Attack-resilient Access Control in Pervasive Computing Environments with Optional Context Authentication Capability , 2007, Mob. Networks Appl..
[37] Xiaodong Lin,et al. An Efficient Pseudonymous Authentication Scheme With Strong Privacy Preservation for Vehicular Communications , 2010, IEEE Transactions on Vehicular Technology.
[38] David Chaum,et al. Group Signatures , 1991, EUROCRYPT.
[39] Radha Poovendran,et al. AMOEBA: Robust Location Privacy Scheme for VANET , 2007, IEEE Journal on Selected Areas in Communications.