EASPSC: Efficient authentication of SignRecryption protocol using shareable clouds in VANET groups
暂无分享,去创建一个
[1] Narendra S. Chaudhari,et al. Integrating group signature scheme with Non-transitive Proxy Re-encryption in VANET , 2016, 2016 International Conference on Computing, Analytics and Security Trends (CAST).
[2] Jean-Jacques Quisquater,et al. Efficient Signcryption with Key Privacy from Gap Diffie-Hellman Groups , 2004, Public Key Cryptography.
[3] Martín Abadi,et al. A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.
[4] Qin Li,et al. Private reputation retrieval in public - a privacy-aware announcement scheme for VANETs , 2015, IET Inf. Secur..
[5] Ran Canetti,et al. Chosen-ciphertext secure proxy re-encryption , 2007, CCS '07.
[6] Muhammad Khurram Khan,et al. More secure smart card-based remote user password authentication scheme with user anonymity , 2014, Secur. Commun. Networks.
[7] Jianhua Li,et al. A Secure Mechanism for Big Data Collection in Large Scale Internet of Vehicle , 2017, IEEE Internet of Things Journal.
[8] Chandrima Chakrabarti,et al. Intention aware misbehavior detection for post-disaster opportunistic communication over peer-to-peer DTN , 2018, Peer-to-Peer Netw. Appl..
[9] Hideki Imai,et al. How to Construct Efficient Signcryption Schemes on Elliptic Curves , 1998, Inf. Process. Lett..
[10] Joonsang Baek,et al. Formal Proofs for the Security of Signcryption , 2002, Journal of Cryptology.
[11] Narendra S. Chaudhari,et al. SEGB: Security Enhanced Group Based AKA Protocol for M2M Communication in an IoT Enabled LTE/LTE-A Network , 2018, IEEE Access.
[12] Jianhong Zhang,et al. On the Security of a Secure Batch Verification with Group Testing for VANET , 2014, Int. J. Netw. Secur..
[13] John Malone-Lee,et al. Identity-Based Signcryption , 2002, IACR Cryptol. ePrint Arch..
[14] Xavier Boyen,et al. Multipurpose Identity-Based Signcryption (A Swiss Army Knife for Identity-Based Cryptography) , 2003, CRYPTO.
[15] Matt Blaze,et al. Divertible Protocols and Atomic Proxy Cryptography , 1998, EUROCRYPT.
[16] Narendra S. Chaudhari,et al. SRCPR: SignReCrypting Proxy Re-Signature in Secure VANET Groups , 2018, IEEE Access.
[17] Jun Ao,et al. Group-based Proxy Re-encryption Scheme Secure Against Chosen Ciphertext Attack , 2009, Int. J. Netw. Secur..
[18] Pin-Han Ho,et al. GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications , 2007, IEEE Transactions on Vehicular Technology.
[19] Deepti D. Shrimankar,et al. Dynamic Group Based Efficient Access Authentication and Key Agreement Protocol for MTC in LTE-A Networks , 2018, Wirel. Pers. Commun..
[20] Yuliang Zheng,et al. Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.
[21] Youngho Park,et al. An efficient and secure navigation protocol based on vehicular cloud , 2016, Int. J. Comput. Math..
[22] Tsung-Min Kuo,et al. Dynamic reversed accumulator , 2018, International Journal of Information Security.
[23] Mohammad Reza Aref,et al. A secure authentication scheme for VANETs with batch verification , 2015, Wirel. Networks.
[24] Xia Feng,et al. A method for defensing against multi-source Sybil attacks in VANET , 2017, Peer-to-Peer Netw. Appl..
[25] Kejie Lu,et al. Cloud-Assisted Safety Message Dissemination in VANET–Cellular Heterogeneous Wireless Network , 2017, IEEE Systems Journal.
[26] Sebastian Mödersheim,et al. The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications , 2005, CAV.
[27] Liqun Chen,et al. Improved Identity-Based Signcryption , 2005, Public Key Cryptography.
[28] Narendra S. Chaudhari,et al. Re-encrypting secure and efficient routing in VANET groups using sharable clouds , 2018, 2018 4th International Conference on Recent Advances in Information Technology (RAIT).
[29] Paulo S. L. M. Barreto,et al. Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps , 2005, ASIACRYPT.
[30] Mianxiong Dong,et al. FCSS: Fog-Computing-based Content-Aware Filtering for Security Services in Information-Centric Social Networks , 2019, IEEE Transactions on Emerging Topics in Computing.
[31] Omprakash Kaiwartya,et al. Real traffic-data based evaluation of vehicular traffic environment and state-of-the-art with future issues in location-centric data dissemination for VANETs , 2017, Digit. Commun. Networks.
[32] Matthew Green,et al. Improved proxy re-encryption schemes with applications to secure distributed storage , 2006, TSEC.
[33] Kang Kai,et al. Fog computing for vehicular Ad-hoc networks: paradigms, scenarios, and issues , 2016 .