Privacy-preserving linkage/revocation of VANET certificates without LAs
暂无分享,去创建一个
Jefferson E. Ricardini | Marcos A. Simplício | Harsh Kupwade Patil | Eduardo Lopes Cominetti | Leonardo T. D. Ferraz | Marcos V. M. Silva | M. Simplício | J. Ricardini | H. Patil | M. V. M. Silva
[1] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[2] Khattab M. Ali Alheeti,et al. An intrusion detection system against malicious attacks on the communication network of driverless cars , 2015, 2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC).
[3] Daniel J. Bernstein,et al. Curve25519: New Diffie-Hellman Speed Records , 2006, Public Key Cryptography.
[4] Mike Lukuc,et al. Vehicle-to-Vehicle Communications: Readiness of V2V Technology for Application , 2014 .
[5] Frank Kargl,et al. PUCA: A pseudonym scheme with strong privacy guarantees for vehicular ad-hoc networks , 2016, Ad Hoc Networks.
[6] William Whyte,et al. A security credential management system for V2V communications , 2013, 2013 IEEE Vehicular Networking Conference.
[7] Morris J. Dworkin,et al. SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions , 2015 .
[8] Simon Josefsson,et al. Edwards-Curve Digital Signature Algorithm (EdDSA) , 2017, RFC.
[9] Panagiotis Papadimitratos,et al. The Key to Intelligent Transportation: Identity and Credential Management in Vehicular Communication Systems , 2015, IEEE Vehicular Technology Magazine.
[10] Panagiotis Papadimitratos,et al. Vehicular communication systems: Enabling technologies, applications, and future outlook on intelligent transportation , 2009, IEEE Communications Magazine.
[11] Carl Eklund,et al. National Institute for Standards and Technology , 2009, Encyclopedia of Biometrics.
[12] Atul Luykx,et al. Multi-key Security: The Even-Mansour Construction Revisited , 2015, CRYPTO.
[13] Jefferson E. Ricardini,et al. ACPC: Efficient revocation of pseudonym certificates using activation codes , 2019, IACR Cryptol. ePrint Arch..
[14] Jefferson E. Ricardini,et al. The Unified Butterfly Effect: Efficient Security Credential Management System for Vehicular Communications , 2018, 2018 IEEE Vehicular Networking Conference (VNC).
[15] Jefferson E. Ricardini,et al. Privacy-Preserving Method for Temporarily Linking/Revoking Pseudonym Certificates in VANETs , 2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).
[16] Tyler Poling,et al. National Security Credential Management System (SCMS) Deployment Support: SCMS Baseline Summary Report , 2018 .
[17] Eli Biham,et al. How to decrypt or even substitute DES-encrypted messages in 228 steps , 2002, Inf. Process. Lett..
[18] Eric R. Verheul,et al. Activate Later Certificates for V2X - Combining ITS efficiency with privacy , 2016, IACR Cryptol. ePrint Arch..
[19] H. Labiod,et al. Risk analysis study of ITS communication architecture , 2012, 2012 Third International Conference on The Network of the Future (NOF).
[20] Tanja Lange,et al. Hash-Based Signatures , 2011, Encyclopedia of Cryptography and Security.
[21] William Whyte,et al. Binary hash tree based certificate access management for connected vehicles , 2017, WISEC.
[22] David Cooper,et al. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile , 2008, RFC.
[23] Elaine B. Barker,et al. Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths , 2011 .
[24] Pierpaolo Cincilla,et al. Vehicular PKI scalability-consistency trade-offs in large scale distributed scenarios , 2016, 2016 IEEE Vehicular Networking Conference (VNC).
[25] Leslie Lamport,et al. Password authentication with insecure communication , 1981, CACM.
[26] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[27] Frank Kargl,et al. Pseudonym Schemes in Vehicular Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.
[28] Paulo S. L. M. Barreto,et al. Lyra2: Efficient Password Hashing with High Security against Time-Memory Trade-Offs , 2016, IEEE Transactions on Computers.