A novel scheme of anonymous authentication on trust in Pervasive Social Networking
暂无分享,去创建一个
[1] T. Ciszkowski,et al. Distributed Reputation Management in Collaborative Environment of Anonymous MANETs , 2007, EUROCON 2007 - The International Conference on "Computer as a Tool".
[2] Xiaodong Lin,et al. Achieving Efficient Cooperative Message Authentication in Vehicular Ad Hoc Networks , 2013, IEEE Transactions on Vehicular Technology.
[3] K. Emura,et al. Secure and Anonymous Communication Technique: Formal Model and Its Prototype Implementation , 2016, IEEE Transactions on Emerging Topics in Computing.
[4] Yu Cheng,et al. A Distributed Key Management Framework with Cooperative Message Authentication in VANETs , 2011, IEEE Journal on Selected Areas in Communications.
[5] Valtteri Niemi,et al. Secure pervasive social networking based on multi-dimensional trust levels , 2013, 2013 IEEE Conference on Communications and Network Security (CNS).
[6] Xuemin Shen,et al. EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks , 2013, IEEE Transactions on Mobile Computing.
[7] Yue Shen,et al. PerContRep: a practical reputation system for pervasive content services , 2014, The Journal of Supercomputing.
[8] Xiaodong Lin,et al. A Threshold Anonymous Authentication Protocol for VANETs , 2016, IEEE Transactions on Vehicular Technology.
[9] Victor C. M. Leung,et al. Joint Topology Control and Authentication Design in Mobile Ad Hoc Networks With Cooperative Communications , 2012, IEEE Transactions on Vehicular Technology.
[10] Libing Wu,et al. Efficient and Anonymous Authentication Scheme for Wireless Body Area Networks , 2016, Journal of Medical Systems.
[11] A. Miyaji,et al. New Explicit Conditions of Elliptic Curve Traces for FR-Reduction , 2001 .
[12] Zheng Yan,et al. Protect Pervasive Social Networking Based on Two-Dimensional Trust Levels , 2017, IEEE Systems Journal.
[13] Zheng Yan,et al. Secure Pervasive Social Communications Based on Trust in a Distributed Way , 2016, IEEE Access.
[14] Yue Shen,et al. A practical reputation system for pervasive social chatting , 2013, J. Comput. Syst. Sci..
[15] David Chaum,et al. Group Signatures , 1991, EUROCRYPT.
[16] Yan Zheng,et al. Anonymous Authentication for Trustworthy Pervasive Social Networking , 2015, IEEE Transactions on Computational Social Systems.
[17] A. Damodaram,et al. ANONYMITY AND ACCOUNTABILITY IN WEB BASED TRANSACTIONS , 2012 .
[18] Moti Yung,et al. Group Signatures with Almost-for-Free Revocation , 2012, CRYPTO.
[19] Xuemin Shen,et al. Efficient Group Signature Scheme Supporting Batch Verification for Securing Vehicular Networks , 2010, 2010 IEEE International Conference on Communications.
[20] Bruce Christianson,et al. Anonymous Authentication , 2004, Security Protocols Workshop.
[21] Atsuko Miyaji,et al. Secure VANET applications with a refined group signature , 2014, 2014 Twelfth Annual International Conference on Privacy, Security and Trust.
[22] Lorrie Faith Cranor,et al. An Investigation into Facebook Friend Grouping , 2011, INTERACT.
[23] Joseph K. Liu,et al. Time-Bound Anonymous Authentication for Roaming Networks , 2015, IEEE Transactions on Information Forensics and Security.
[24] Tadanori Mizuno,et al. Message authentication scheme for mobile ad hoc networks , 2005, 11th International Conference on Parallel and Distributed Systems (ICPADS'05).
[25] Maxim Raya,et al. Securing vehicular ad hoc networks , 2007, J. Comput. Secur..
[26] Pin-Han Ho,et al. TSVC: timed efficient and secure vehicular communications with privacy preserving , 2008, IEEE Transactions on Wireless Communications.
[27] Ahmad-Reza Sadeghi,et al. Anonymous Authentication with TLS and DAA , 2010, TRUST.
[28] Hovav Shacham,et al. Short Group Signatures , 2004, CRYPTO.
[29] Sherali Zeadally,et al. Anonymous Authentication for Wireless Body Area Networks With Provable Security , 2017, IEEE Systems Journal.
[30] Zheng Yan,et al. Anonymous Authentication on Trust in Pervasive Social Networking Based on Group Signature , 2017, IEEE Access.
[31] Josep Domingo-Ferrer,et al. A Scalable Robust Authentication Protocol for Secure Vehicular Communications , 2010, IEEE Transactions on Vehicular Technology.
[32] Kyung Sup Kwak,et al. Certificateless Remote Anonymous Authentication Schemes for WirelessBody Area Networks , 2014, IEEE Transactions on Parallel and Distributed Systems.
[33] Rui L. Aguiar,et al. Support of Anonymity in VANETs - Putting Pseudonymity into Practice , 2007, 2007 IEEE Wireless Communications and Networking Conference.
[34] Zheng Yan,et al. A Scheme to Secure Instant Community Data Access Based on Trust and Contexts , 2014, 2014 IEEE International Conference on Computer and Information Technology.
[35] Hui Li,et al. Efficient Privacy-Preserving Authentication for Vehicular Ad Hoc Networks , 2014, IEEE Transactions on Vehicular Technology.
[36] Hovav Shacham,et al. Aggregate and Verifiably Encrypted Signatures from Bilinear Maps , 2003, EUROCRYPT.
[37] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[38] Yun-kyung Lee,et al. Anonymous Authentication System Using Group Signature , 2009, 2009 International Conference on Complex, Intelligent and Software Intensive Systems.
[39] Pin-Han Ho,et al. An Efficient Identity-Based Batch Verification Scheme for Vehicular Sensor Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[40] Jinjun Chen,et al. Efficiently Predicting Trustworthiness of Mobile Services Based on Trust Propagation in Social Networks , 2015, Mob. Networks Appl..
[41] Jin Li,et al. Privacy-preserving outsourced classification in cloud computing , 2017, Cluster Computing.