Reliable Cooperative Authentication for Vehicular Networks
暂无分享,去创建一个
Dong Hoon Lee | In Seok Kim | Hyo Jin Jo | H. Jo | I. Kim
[1] Maxim Raya,et al. Securing vehicular ad hoc networks , 2007, J. Comput. Secur..
[2] O.K. Tonguz,et al. What is the Best Achievable QoS for Unicast Routing in VANETs? , 2008, 2008 IEEE Globecom Workshops.
[3] Om Prakash,et al. EMAP: EXPEDITE MESSAGE AUTHENTICATION PROTOCOL FOR VEHICULAR AD HOC NETWORKS , 2014 .
[4] A. Peinado. Flaws in the Application of Number Theory in Key Distribution Schemes for Multicast Networks , 2016 .
[5] Elaine Shi,et al. TACKing Together Efficient Authentication, Revocation, and Privacy in VANETs , 2009, 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[6] Xiaodong Lin,et al. Achieving Efficient Cooperative Message Authentication in Vehicular Ad Hoc Networks , 2013, IEEE Transactions on Vehicular Technology.
[7] Josep Domingo-Ferrer,et al. Privacy-Preserving Vehicular Communication Authentication with Hierarchical Aggregation and Fast Response , 2015, IEEE Transactions on Computers.
[8] H. Alshaer,et al. Emerging client-server and ad-hoc approach in inter-vehicle communication platform , 2004, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004.
[9] Mingxing He,et al. Self-healing Key Distribution with Revocation and Resistance to the Collusion Attack in Wireless Sensor Networks , 2008, ProvSec.
[10] Pin-Han Ho,et al. RAISE: An Efficient RSU-Aided Message Authentication Scheme in Vehicular Communication Networks , 2008, 2008 IEEE International Conference on Communications.
[11] H. Alshaer,et al. An optimized adaptive broadcast scheme for inter-vehicle communication , 2005, 2005 IEEE 61st Vehicular Technology Conference.
[12] Arputharaj Kannan,et al. Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks , 2016, IEEE Transactions on Intelligent Transportation Systems.
[13] Jean-Pierre Seifert,et al. Remote Attestation with Domain-Based Integrity Model and Policy Analysis , 2012, IEEE Transactions on Dependable and Secure Computing.
[14] H. Alshaer. Securing vehicular ad-hoc networks connectivity with roadside units support , 2015, 2015 IEEE 8th GCC Conference & Exhibition.
[15] Josep Domingo-Ferrer,et al. Practical secure and privacy-preserving scheme for value-added applications in VANETs , 2015, Comput. Commun..
[16] Naveen K. Chilamkurti,et al. Collaborative trust aware intelligent intrusion detection in VANETs , 2014, Comput. Electr. Eng..
[17] Pin-Han Ho,et al. GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications , 2007, IEEE Transactions on Vehicular Technology.
[18] Xiaodong Lin,et al. A Threshold Anonymous Authentication Protocol for VANETs , 2016, IEEE Transactions on Vehicular Technology.
[19] Pandi Vijayakumar,et al. CPAV: Computationally Efficient Privacy Preserving Anonymous Authentication Scheme for Vehicular Ad Hoc Networks , 2015, 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing.
[20] Dong Hoon Lee,et al. Efficient Privacy-Preserving Authentication in Wireless Mobile Networks , 2014, IEEE Transactions on Mobile Computing.
[21] Liehuang Zhu,et al. 2FLIP: A Two-Factor Lightweight Privacy-Preserving Authentication Scheme for VANET , 2016, IEEE Transactions on Vehicular Technology.
[22] S. Supriya,et al. EFFICIENT PRIVACY PRESERVING AUTHENTICATION FOR VEHICULAR AD-HOC NETWORKS , 2015 .
[23] Khaled Ben Letaief,et al. On the Joint V2I and V2V Scheduling for Cooperative VANETs With Network Coding , 2012, IEEE Transactions on Vehicular Technology.
[24] Josep Domingo-Ferrer,et al. A Scalable Robust Authentication Protocol for Secure Vehicular Communications , 2010, IEEE Transactions on Vehicular Technology.
[25] Xiaodong Lin,et al. An Efficient Pseudonymous Authentication Scheme With Strong Privacy Preservation for Vehicular Communications , 2010, IEEE Transactions on Vehicular Technology.
[26] Xuemin Shen,et al. BAT: A robust signature scheme for vehicular networks using Binary Authentication Tree , 2009, IEEE Transactions on Wireless Communications.
[27] Jianxin Wang,et al. Vehicle Density Based Forwarding Protocol for Safety Message Broadcast in VANET , 2014, TheScientificWorldJournal.
[28] Arputharaj Kannan,et al. Chinese remainder theorem based centralised group key management for secure multicast communication , 2014, IET Inf. Secur..
[29] Yu Cheng,et al. A Distributed Key Management Framework with Cooperative Message Authentication in VANETs , 2011, IEEE Journal on Selected Areas in Communications.