EIAS-CP: new efficient identity-based authentication scheme with conditional privacy-preserving for VANETs
暂无分享,去创建一个
Jian Shen | Yong Xie | Libing Wu | Abdulhameed Alelaiwi | Libing Wu | Abdulhameed Alelaiwi | Jian Shen | Yong Xie
[1] Tsz Hon Yuen,et al. Improvements on an authentication scheme for vehicular sensor networks , 2014, Expert Syst. Appl..
[2] Pin-Han Ho,et al. AEMA: An Aggregated Emergency Message Authentication Scheme for Enhancing the Security of Vehicular Ad Hoc Networks , 2008, 2008 IEEE International Conference on Communications.
[3] Sherali Zeadally,et al. VANET-cloud: a generic cloud computing model for vehicular Ad Hoc networks , 2015, IEEE Wireless Communications.
[4] Jianfeng Ma,et al. An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks , 2015, Peer-to-Peer Netw. Appl..
[5] Jianfeng Ma,et al. Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy , 2016 .
[6] Jia-Lun Tsai,et al. A Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services , 2015, IEEE Systems Journal.
[7] Maxim Raya,et al. Securing vehicular ad hoc networks , 2007, J. Comput. Secur..
[8] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[9] Jianfeng Ma,et al. A privacy preserving three-factor authentication protocol for e-Health clouds , 2016, The Journal of Supercomputing.
[10] Mohsen Guizani,et al. ACPN: A Novel Authentication Framework with Conditional Privacy-Preservation and Non-Repudiation for VANETs , 2015, IEEE Transactions on Parallel and Distributed Systems.
[11] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[12] Jianhong Zhang,et al. On the Security of a Secure Batch Verification with Group Testing for VANET , 2014, Int. J. Netw. Secur..
[13] Victor S. Miller,et al. Use of Elliptic Curves in Cryptography , 1985, CRYPTO.
[14] Michael Scott,et al. A Taxonomy of Pairing-Friendly Elliptic Curves , 2010, Journal of Cryptology.
[15] Hung-Yu Chien,et al. ABAKA: An Anonymous Batch Authenticated and Key Agreement Scheme for Value-Added Services in Vehicular Ad Hoc Networks , 2011, IEEE Transactions on Vehicular Technology.
[16] Jacques Stern,et al. Security Proofs for Signature Schemes , 1996, EUROCRYPT.
[17] Pin-Han Ho,et al. ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[18] Pin-Han Ho,et al. An Efficient Identity-Based Batch Verification Scheme for Vehicular Sensor Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[19] Sherali Zeadally,et al. Anonymous Authentication for Wireless Body Area Networks With Provable Security , 2017, IEEE Systems Journal.
[20] Pin-Han Ho,et al. On batch verification with group testing for vehicular communications , 2011, Wirel. Networks.
[21] Mohammad Reza Aref,et al. A secure authentication scheme for VANETs with batch verification , 2015, Wirel. Networks.
[22] Maxim Raya,et al. Mix-Zones for Location Privacy in Vehicular Networks , 2007 .
[23] Alfred Menezes,et al. Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.
[24] Mojtaba Alizadeh,et al. Cryptanalysis and Improvement of "A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks" , 2015, PloS one.
[25] Atsuko Miyaji,et al. An efficient batch verification system and its effect in a real time VANET environment , 2015, Secur. Commun. Networks.
[26] Sunilkumar S. Manvi,et al. Information management in vehicular ad hoc networks: A review , 2014, J. Netw. Comput. Appl..
[27] Siu-Ming Yiu,et al. SPECS: Secure and privacy enhancing communications schemes for VANETs , 2011, Ad Hoc Networks.
[28] Pin-Han Ho,et al. RAISE: An Efficient RSU-Aided Message Authentication Scheme in Vehicular Communication Networks , 2008, 2008 IEEE International Conference on Communications.
[29] Pingzhi Fan,et al. b-SPECS+: Batch Verification for Secure Pseudonymous Authentication in VANET , 2013, IEEE Transactions on Information Forensics and Security.
[30] Kim-Kwang Raymond Choo,et al. A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network , 2018, IEEE Transactions on Dependable and Secure Computing.
[31] Debiao He,et al. One-to-many authentication for access control in mobile pay-TV systems , 2016, Science China Information Sciences.
[32] Kyung-Ah Shim,et al. ${\cal CPAS}$: An Efficient Conditional Privacy-Preserving Authentication Scheme for Vehicular Sensor Networks , 2012, IEEE Transactions on Vehicular Technology.
[33] Cheng-Chi Lee,et al. Toward a secure batch verification with group testing for VANET , 2013, Wirel. Networks.
[34] Jia-Lun Tsai,et al. An Efficient Conditional Privacy-Preserving Authentication Scheme for Vehicular Sensor Networks Without Pairings , 2016, IEEE Transactions on Intelligent Transportation Systems.