V-Tokens for Conditional Pseudonymity in VANETs
暂无分享,去创建一个
[1] Paul Syverson,et al. Onion Routing for Anonymous and Private Internet Connections , 1999 .
[2] Panagiotis Papadimitratos,et al. Secure vehicular communication systems: design and architecture , 2008, IEEE Communications Magazine.
[3] R. Cramer,et al. Multiparty Computation from Threshold Homomorphic Encryption , 2000 .
[4] Frederik Armknecht,et al. Cross-layer Privacy Enhancement and Non-repudiation in Vehicular Communication , 2011 .
[5] Paul F. Syverson,et al. Onion routing , 1999, CACM.
[6] Markulf Kohlweiss,et al. Self-certified Sybil-free pseudonyms , 2008, WiSec '08.
[7] Zhendong Ma,et al. Privacy Requirements in Vehicular Communication Systems , 2009, 2009 International Conference on Computational Science and Engineering.
[8] Taher ElGamal,et al. A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .
[9] David Chaum,et al. Blind Signature System , 1983, CRYPTO.
[10] David R. Karger,et al. Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.
[11] Claudia Eckert,et al. Revocable Anonymous Authenticated Inter-Vehicle Communication (SRAAC) , 2006 .
[12] Ivan Damgård,et al. Commitment Schemes and Zero-Knowledge Protocols , 1998, Lectures on Data Security.
[13] Amos Fiat,et al. Untraceable Electronic Cash , 1990, CRYPTO.
[14] Gustavus J. Simmons,et al. An Introduction to Shared Secret and/or Shared Control Schemes and Their ApplicationThis work was performed at Sandia National Laboratories and supported by the U.S. Department of Energy under contract number DEAC0476DPOO789. , 1992 .
[15] Josh Benaloh,et al. Secret Sharing Homomorphisms: Keeping Shares of A Secret Sharing , 1986, CRYPTO.