An Attribute-Based Framework for Secure Communications in Vehicular Ad Hoc Networks
暂无分享,去创建一个
Robert H. Deng | Hui Cui | Guilin Wang | R. Deng | Guilin Wang | Hui Cui
[1] Wenfen Liu,et al. Revocable Threshold Attribute-Based Signature against Signing Key Exposure , 2015, ISPEC.
[2] Jianhong Zhang,et al. Breaking and Repairing of an Anonymous and Traceable Communication Protocol for Vehicular Ad Hoc Networks , 2012, 2012 IEEE 12th International Conference on Computer and Information Technology.
[3] Dijiang Huang,et al. ASPE: attribute-based secure policy enforcement in vehicular ad hoc networks , 2009, Ad Hoc Networks.
[4] Brent Waters,et al. Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys , 2005, CRYPTO.
[5] Srdjan Capkun,et al. The security and privacy of smart vehicles , 2004, IEEE Security & Privacy Magazine.
[6] Hong Wen,et al. A Novel Framework for Message Authentication in Vehicular Communication Networks , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.
[7] Siaw-Lynn Ng,et al. Threshold Anonymous Announcement in VANETs , 2011, IEEE Journal on Selected Areas in Communications.
[8] Ian Miers,et al. Charm: a framework for rapidly prototyping cryptosystems , 2013, Journal of Cryptographic Engineering.
[9] Pin-Han Ho,et al. GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications , 2007, IEEE Transactions on Vehicular Technology.
[10] Robert H. Deng,et al. Server-Aided Attribute-Based Signature With Revocation for Resource-Constrained Industrial-Internet-of-Things Devices , 2018, IEEE Transactions on Industrial Informatics.
[11] Manoj Prabhakaran,et al. Attribute-Based Signatures , 2011, CT-RSA.
[12] Moni Naor,et al. Revocation and Tracing Schemes for Stateless Receivers , 2001, CRYPTO.
[13] Frank Kargl,et al. PUCA: A pseudonym scheme with user-controlled anonymity for vehicular ad-hoc networks (VANET) , 2014, 2014 IEEE Vehicular Networking Conference (VNC).
[14] Javier Herranz,et al. Short Attribute-Based Signatures for Threshold Predicates , 2012, CT-RSA.
[15] Pin-Han Ho,et al. RAISE: An Efficient RSU-Aided Message Authentication Scheme in Vehicular Communication Networks , 2008, 2008 IEEE International Conference on Communications.
[16] Ke Zeng,et al. Pseudonymous PKI for Ubiquitous Computing , 2006, EuroPKI.
[17] Panagiotis Papadimitratos,et al. Eviction of Misbehaving and Faulty Nodes in Vehicular Networks , 2007, IEEE Journal on Selected Areas in Communications.
[18] Jan Camenisch,et al. Efficient Group Signature Schemes for Large Groups (Extended Abstract) , 1997, CRYPTO.
[19] Elaine Shi,et al. TACKing Together Efficient Authentication, Revocation, and Privacy in VANETs , 2009, 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[20] Amos Fiat,et al. How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.
[21] Chun-Ta Li,et al. A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks , 2008, Comput. Commun..
[22] Silvio Micali,et al. The knowledge complexity of interactive proof-systems , 1985, STOC '85.
[23] Ankit Singh,et al. Restricted usage of anonymous credentials in vehicular ad hoc networks for misbehavior detection , 2017, International Journal of Information Security.
[24] Kenneth G. Paterson,et al. A comparison between traditional public key infrastructures and identity-based cryptography , 2003, Inf. Secur. Tech. Rep..
[25] Josep Domingo-Ferrer,et al. Preserving Security and Privacy in Large-Scale VANETs , 2011, ICICS.
[26] Xuemin Shen,et al. MAAC: Message Authentication Acceleration Protocol for Vehicular Ad Hoc Networks , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.
[27] Hui Xiong,et al. Achieving Guaranteed Anonymity in GPS Traces via Uncertainty-Aware Path Cloaking , 2010, IEEE Transactions on Mobile Computing.
[28] Arati Baliga,et al. An identity-based security framework For VANETs , 2006, VANET '06.
[29] Vipul Goyal,et al. Identity-based encryption with efficient revocation , 2008, IACR Cryptol. ePrint Arch..
[30] Panagiotis Papadimitratos,et al. Efficient and robust pseudonymous authentication in VANET , 2007, VANET '07.
[31] Josep Domingo-Ferrer,et al. A Scalable Robust Authentication Protocol for Secure Vehicular Communications , 2010, IEEE Transactions on Vehicular Technology.
[32] Ratna Dutta,et al. Efficient Attribute Based Access Control Mechanism for Vehicular Ad Hoc Network , 2013, NSS.
[33] Markus Jakobsson,et al. Balancing auditability and privacy in vehicular networks , 2005, Q2SWinet '05.
[34] Yang Li,et al. Efficient authentication and access control of message dissemination over vehicular ad hoc network , 2016, Neurocomputing.
[35] Tao Zhang,et al. Enforcing Privacy Using Symmetric Random Key-Set in Vehicular Networks , 2007, Eighth International Symposium on Autonomous Decentralized Systems (ISADS'07).
[36] Josep Domingo-Ferrer,et al. Balanced Trustworthiness, Safety, and Privacy in Vehicle-to-Vehicle Communications , 2010, IEEE Transactions on Vehicular Technology.
[37] Frank Kargl,et al. Pseudonym Schemes in Vehicular Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.
[38] Maxim Raya,et al. Securing vehicular ad hoc networks , 2007, J. Comput. Secur..
[39] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.