An Efficient Anonymous Authentication Scheme for Internet of Vehicles
暂无分享,去创建一个
Mohsen Guizani | Xiaojiang Du | Rong Sun | Jingwei Liu | Qingqing Li | M. Guizani | Xiaojiang Du | Rong Sun | Jingwei Liu | Qingqing Li
[1] Song Guo,et al. Fool Me If You Can: Mimicking Attacks and Anti-Attacks in Cyberspace , 2015, IEEE Transactions on Computers.
[2] Mohsen Guizani,et al. Transactions papers a routing-driven Elliptic Curve Cryptography based key management scheme for Heterogeneous Sensor Networks , 2009, IEEE Transactions on Wireless Communications.
[3] Gwoboa Horng,et al. Strong non-repudiation based on certificateless short signatures , 2013, IET Inf. Secur..
[4] Ying-Hao Hung,et al. A Revocable Certificateless Short Signature Scheme and Its Authentication Application , 2016, Informatica.
[5] Fei Hu,et al. Detection of Faults and Attacks Including False Data Injection Attack in Smart Grid Using Kalman Filter , 2014, IEEE Transactions on Control of Network Systems.
[6] Li Xu,et al. Cost-Effective Authentic and Anonymous Data Sharing with Forward Security , 2015, IEEE Transactions on Computers.
[7] Chase Qishi Wu,et al. Secure cell relay routing protocol for sensor networks , 2005, PCCC 2005. 24th IEEE International Performance, Computing, and Communications Conference, 2005..
[8] Yi Mu,et al. Certificateless Signature Revisited , 2007, ACISP.
[9] Chin-Teng Lin,et al. Internet of Vehicles: Motivation, Layered Architecture, Network Model, Challenges, and Future Aspects , 2016, IEEE Access.
[10] Qing Yang,et al. On the Security of Information Dissemination in the Internet-of-Vehicles , 2017 .
[11] Mukesh Singhal,et al. Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..
[12] Song Guo,et al. Utility Based Data Computing Scheme to Provide Sensing Service in Internet of Things , 2019, IEEE Transactions on Emerging Topics in Computing.
[13] Jianhua Chen,et al. New certificateless short signature scheme , 2013, IET Inf. Secur..
[14] Wanlei Zhou,et al. Modeling malicious activities in cyber space , 2015, IEEE Network.
[15] Ch. Ramesh Babu,et al. Internet of Vehicles: From Intelligent Grid to Autonomous Cars and Vehicular Clouds , 2016 .
[16] Jie Wu,et al. Robust Network Traffic Classification , 2015, IEEE/ACM Transactions on Networking.
[17] Xiaojiang Du,et al. Internet Protocol Television (IPTV): The Killer Application for the Next-Generation Internet , 2007, IEEE Communications Magazine.
[18] Song Guo,et al. Incentive Scheme for Cyber Physical Social Systems Based on User Behaviors , 2020, IEEE Transactions on Emerging Topics in Computing.
[19] Willy Susilo,et al. Strongly secure certificateless short signatures , 2012, J. Syst. Softw..
[20] Fei Hu,et al. Optimized scheduling for data aggregation in wireless sensor networks , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.
[21] Mohsen Guizani,et al. Secure and Efficient Time Synchronization in Heterogeneous Sensor Networks , 2008, IEEE Transactions on Vehicular Technology.
[22] Mohsen Guizani,et al. An effective key management scheme for heterogeneous sensor networks , 2007, Ad Hoc Networks.
[23] Song Guo,et al. Malware Propagation in Large-Scale Networks , 2015, IEEE Transactions on Knowledge and Data Engineering.
[24] Xiaojiang Du,et al. Maintaining Differentiated Coverage in Heterogeneous Sensor Networks , 2005, EURASIP J. Wirel. Commun. Netw..
[25] Xiangguo Cheng,et al. An Efficient Identity-based Signature Scheme and Its Applications , 2007, Int. J. Netw. Secur..
[26] Haibin Zhang,et al. When Smart Wearables Meet Intelligent Vehicles: Challenges and Future Directions , 2017, IEEE Wireless Communications.
[27] Rajasekhar Mungara,et al. A Routing-Driven Elliptic Curve Cryptography based Key Management Scheme for Heterogeneous Sensor Networks , 2014 .
[28] Jiajia Liu,et al. In-Vehicle Network Attacks and Countermeasures: Challenges and Future Directions , 2017, IEEE Network.
[29] Raylin Tso,et al. Efficient ID-Based Digital Signatures with Message Recovery , 2007, CANS.
[30] Xiaojiang Du,et al. A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..
[31] Mario Gerla,et al. Vehicular Cloud Computing , 2012, 2012 The 11th Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net).
[32] Yang Xiang,et al. Modeling the Propagation of Worms in Networks: A Survey , 2014, IEEE Communications Surveys & Tutorials.