Privacy-Preserved Pseudonym Scheme for Fog Computing Supported Internet of Vehicles
暂无分享,去创建一个
Rong Yu | Jiawen Kang | Xumin Huang | Yan Zhang | Jiawen Kang | Yan Zhang | Rong Yu | Xumin Huang
[1] Depeng Jin,et al. Vehicular Fog Computing: A Viewpoint of Vehicles as the Infrastructures , 2016, IEEE Transactions on Vehicular Technology.
[2] Xiaoyan Zhu,et al. An Efficient Anonymous Batch Authentication Scheme Based on HMAC for VANETs , 2016, IEEE Transactions on Intelligent Transportation Systems.
[3] Pin-Han Ho,et al. ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[4] Xiaohui Liang,et al. A Dynamic Privacy-Preserving Key Management Scheme for Location-Based Services in VANETs , 2012, IEEE Transactions on Intelligent Transportation Systems.
[5] Youngho Park,et al. Pseudonymous authentication for secure V2I services in cloud-based vehicular networks , 2016, J. Ambient Intell. Humaniz. Comput..
[6] Frank Kargl,et al. Pseudonym Schemes in Vehicular Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.
[7] Yacine Ghamri-Doudane,et al. Software defined networking-based vehicular Adhoc Network with Fog Computing , 2015, 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM).
[8] Jelena V. Misic,et al. Privacy and Anonymity in VANETs: A Contemporary Study , 2010, Ad Hoc Sens. Wirel. Networks.
[9] Shengli Xie,et al. MixGroup: Accumulative Pseudonym Exchanging for Location Privacy Enhancement in Vehicular Social Networks , 2016, IEEE Transactions on Dependable and Secure Computing.
[10] Choong Seon Hong,et al. A Fog based system model for cooperative IoT node pairing using matching theory , 2015, 2015 17th Asia-Pacific Network Operations and Management Symposium (APNOMS).
[11] Dan Lin,et al. Privacy-aware access control for message exchange in vehicular ad hoc networks , 2014, Telecommunication Systems.
[12] Mahadev Satyanarayanan,et al. Are Cloudlets Necessary , 2015 .
[13] Michael Weber,et al. Pseudonym-On-Demand: A New Pseudonym Refill Strategy for Vehicular Communications , 2008, 2008 IEEE 68th Vehicular Technology Conference.
[14] Levente Buttyán,et al. SLOW: A Practical pseudonym changing scheme for location privacy in VANETs , 2009, 2009 IEEE Vehicular Networking Conference (VNC).
[15] Albert-László Barabási,et al. Limits of Predictability in Human Mobility , 2010, Science.
[16] Hassan Artail,et al. A Pseudonym Management System to Achieve Anonymity in Vehicular Ad Hoc Networks , 2016, IEEE Transactions on Dependable and Secure Computing.
[17] Xiaohui Liang,et al. Pseudonym Changing at Social Spots: An Effective Strategy for Location Privacy in VANETs , 2012, IEEE Transactions on Vehicular Technology.
[18] Mohsen Guizani,et al. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.
[19] Athanasios V. Vasilakos,et al. Mobile Crowd Sensing for Traffic Prediction in Internet of Vehicles , 2016, Sensors.
[20] Maxim Raya,et al. Mix-Zones for Location Privacy in Vehicular Networks , 2007 .
[21] David C. Parkes,et al. On non-cooperative location privacy: a game-theoretic analysis , 2009, CCS.
[22] Zhiyi Fang,et al. Securing Vehicular Ad Hoc Networks , 2007, 2007 2nd International Conference on Pervasive Computing and Applications.
[23] Keke Gai,et al. Dynamic energy-aware cloudlet-based mobile cloud computing model for green computing , 2016, J. Netw. Comput. Appl..