A Survey on Secure Safety Applications in VANET
暂无分享,去创建一个
Bo Zhou | Qi Shi | Ruqayah Al-ani | Ali Sagheer | Q. Shi | Bo Zhou | A. Sagheer | R. Al-ani
[1] Pin-Han Ho,et al. RAISE: An Efficient RSU-Aided Message Authentication Scheme in Vehicular Communication Networks , 2008, 2008 IEEE International Conference on Communications.
[2] S. Supriya,et al. EFFICIENT PRIVACY PRESERVING AUTHENTICATION FOR VEHICULAR AD-HOC NETWORKS , 2015 .
[3] Elaine Shi,et al. TACKing Together Efficient Authentication, Revocation, and Privacy in VANETs , 2009, 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[4] Jun Pang,et al. A Group Signature Based Electronic Toll Pricing System , 2011, 2012 Seventh International Conference on Availability, Reliability and Security.
[5] Zhendong Ma,et al. Privacy Requirements in Vehicular Communication Systems , 2009, 2009 International Conference on Computational Science and Engineering.
[6] Michael Maile,et al. Vehicle Safety Communications – Applications (VSC-A) Final Report: Appendix Volume 3 Security , 2011 .
[7] Sudip Misra,et al. Security in Vehicular Ad Hoc Networks , 2016 .
[8] Ai-Chun Pang,et al. Efficient pseudonym changing schemes for location privacy protection in VANETs , 2013, 2013 International Conference on Connected Vehicles and Expo (ICCVE).
[9] Pin-Han Ho,et al. GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications , 2007, IEEE Transactions on Vehicular Technology.
[10] Jian Shen,et al. EIAS-CP: new efficient identity-based authentication scheme with conditional privacy-preserving for VANETs , 2016, Telecommunication Systems.
[11] F. Kargl,et al. Security and privacy in vehicular networks , 2015 .
[12] Tao Zhang,et al. Enforcing Privacy Using Symmetric Random Key-Set in Vehicular Networks , 2007, Eighth International Symposium on Autonomous Decentralized Systems (ISADS'07).
[13] Li Feng,et al. An Analytical Model for Random Changing Pseudonyms Scheme in VANETs , 2011, 2011 International Conference on Network Computing and Information Security.
[14] Fan Bai,et al. Towards Characterising and Classifying Communication–based Automotive Applications from a Wireless Networking Perspective , 2012 .
[15] Maxim Raya,et al. Mix-Zones for Location Privacy in Vehicular Networks , 2007 .
[16] Hong Liu,et al. Message authentication in driverless cars , 2016, 2016 IEEE Symposium on Technologies for Homeland Security (HST).
[17] Xiaodong Lin,et al. Achieving Efficient Cooperative Message Authentication in Vehicular Ad Hoc Networks , 2013, IEEE Transactions on Vehicular Technology.
[18] Xiaohui Liang,et al. Pseudonym Changing at Social Spots: An Effective Strategy for Location Privacy in VANETs , 2012, IEEE Transactions on Vehicular Technology.
[19] Frank Kargl,et al. Pseudonym Schemes in Vehicular Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.
[20] Radha Poovendran,et al. AMOEBA: Robust Location Privacy Scheme for VANET , 2007, IEEE Journal on Selected Areas in Communications.
[21] Karim Emara,et al. Safety-aware Location Privacy in Vehicular Ad-hoc Networks , 2016 .
[22] Xuemin Shen,et al. ASIC: Aggregate Signatures and Certificates Verification Scheme for Vehicular Networks , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.
[23] Eylem Ekici,et al. Vehicular Networking: A Survey and Tutorial on Requirements, Architectures, Challenges, Standards and Solutions , 2011, IEEE Communications Surveys & Tutorials.
[24] Xiwei Wang,et al. A scalable and secure key distribution scheme for group signature based authentication in VANET , 2017, 2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON).
[25] Xuemin Shen,et al. BAT: A robust signature scheme for vehicular networks using Binary Authentication Tree , 2009, IEEE Transactions on Wireless Communications.
[26] W. D. Jones,et al. Keeping cars from crashing , 2001 .
[27] Hung-Yu Chien,et al. ABAKA: An Anonymous Batch Authenticated and Key Agreement Scheme for Value-Added Services in Vehicular Ad Hoc Networks , 2011, IEEE Transactions on Vehicular Technology.
[28] Raja Sengupta,et al. Cooperative Collision Warning Systems: Concept Definition and Experimental Implementation , 2006, J. Intell. Transp. Syst..
[29] Reinhard German,et al. Strong and affordable location privacy in VANETs: Identity diffusion using time-slots and swapping , 2010, 2010 IEEE Vehicular Networking Conference.
[30] Xiaodong Lin,et al. A Threshold Anonymous Authentication Protocol for VANETs , 2016, IEEE Transactions on Vehicular Technology.
[31] Yu Cheng,et al. A Distributed Key Management Framework with Cooperative Message Authentication in VANETs , 2011, IEEE Journal on Selected Areas in Communications.
[32] Elmar Schoch,et al. On the efficiency of secure beaconing in VANETs , 2010, WiSec '10.
[33] Levente Buttyán,et al. On the Effectiveness of Changing Pseudonyms to Provide Location Privacy in VANETs , 2007, ESAS.
[34] Adrian Perrig,et al. Flexible, extensible, and efficient VANET authentication , 2009, Journal of Communications and Networks.
[35] Reinhard German,et al. A performance study of cooperative awareness in ETSI ITS G5 and IEEE WAVE , 2013, 2013 10th Annual Conference on Wireless On-demand Network Systems and Services (WONS).
[36] Dawu Gu,et al. PBA: Prediction-Based Authentication for Vehicle-to-Vehicle Communications , 2016, IEEE Transactions on Dependable and Secure Computing.
[37] Raja Sengupta,et al. Cooperative Collision Warning: Enabling Crash Avoidance with Wireless Technology , 2005 .
[38] David Chaum,et al. Group Signatures , 1991, EUROCRYPT.
[39] Dawn Song,et al. The TESLA Broadcast Authentication Protocol , 2002 .
[40] Emmanouil Magkos,et al. Strengthening Privacy Protection in VANETs , 2008, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.
[41] Siu-Ming Yiu,et al. SPECS: Secure and privacy enhancing communications schemes for VANETs , 2011, Ad Hoc Networks.
[42] Levente Buttyán,et al. SLOW: A Practical pseudonym changing scheme for location privacy in VANETs , 2009, 2009 IEEE Vehicular Networking Conference (VNC).
[43] Adrian Perrig,et al. Flooding-resilient broadcast authentication for VANETs , 2011, MobiCom.
[44] Kenneth P. Laberteaux,et al. STRONG VANET SECURITY ON A BUDGET , 2006 .
[45] Weidong Yang. Security in Vehicular Ad Hoc Networks (VANETs) , 2013 .
[46] Maxim Raya,et al. Securing vehicular ad hoc networks , 2007, J. Comput. Secur..
[47] Kanika Grover,et al. Performance Comparison between Broadcast Authentication Methods for Vehicular Networks , 2016, ICINS '16.
[48] Radha Poovendran,et al. Swing & swap: user-centric approaches towards maximizing location privacy , 2006, WPES '06.
[49] M. Gerlach. Full Paper : Assessing and Improving Privacy in VANETs , 2006 .
[50] R. Poovendran,et al. CARAVAN: Providing Location Privacy for VANET , 2005 .
[51] Brijesh Kumar Chaurasia,et al. Pseudonym Based Mechanism for Sustaining Privacy in VANETs , 2009, 2009 First International Conference on Computational Intelligence, Communication Systems and Networks.
[52] Pin-Han Ho,et al. An Efficient Identity-Based Batch Verification Scheme for Vehicular Sensor Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[53] Mohammad Reza Aref,et al. A secure authentication scheme for VANETs with batch verification , 2015, Wirel. Networks.