Computer Science ›› 2020, Vol. 47 ›› Issue (11): 55-59.doi: 10.11896/jsjkx.200500116
Special Issue: Intelligent Mobile Authentication
• Intelligent Mobile Authentication • Previous Articles Next Articles
XIONG Ling1,2, LI Fa-gen1, LIU Zhi-cai2
CLC Number:
[1] HE D,ZEADALLY S,XU B,et al.An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks[J].IEEE Trans.Inf.Forensics Security,2015,10(12):2681-2691. [2] LO N,TSAI J.An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks without pairings[J].IEEE Trans.Intell.Transp.Syst.,2016,17(5):1319-1328. [3] ZHANG L,WU Q,DOMINGO J,et al.Distributed aggregateprivacy-preserving authentication in VANETs[J].IEEE Trans.Intell.Transp.Syst.,2017,18(3):516-526. [4] YAO Y,CHANG X,MISIC J,et al.BLA:Blockchain-Assisted Lightweight Anonymous Authentication for Distributed Vehicular Fog Services[J].IEEE Internet of Things Journal,2019,6(2):3775-3784. [5] LIU Z,XIONG L,PENG T,et al.A Realistic Distributed Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks[J].IEEE Access,2018,6:26307-26317. [6] KANG J,YU R,HUANG X,et al.Blockchain for Secure andEfficient Data Sharing in Vehicular Edge Computing and Networks[J].IEEE Internet of Things Journal,2019,6(3):4660-4670. [7] LI M,ZHU L,LIN X.Efficient and Privacy-Preserving Carpooling Using Blockchain-Assisted Vehicular Fog Computing[J].IEEE Internet of Things Journal,2019,6(3):4573-4584. [8] WAZID M,BAGGA P,DAS A,et al.AKM-IoV:Authenticated Key Management Protocol in Fog Computing-Based Internet of Vehicles Deployment[J].IEEE Internet of Things Journal,2019,6(5):8804-8817. [9] WANG D,WANG P.Two Birds with One Stone:Two-FactorAuthentication with Security Beyond Conventional Bound[J].IEEE Trans.Dependable Secur.Comput.,2018,15(4):708-722. [10] WANG D,WANG N,WANG P,et al.Preserving privacy forfree:Efficient and provably secure two-factor authentication scheme with user anonymity[J].Information Sciences,2015,321:162-178. [11] ZHOU C,LU H,XIANG Y,et al.Survey on Application ofBlock chain in VANET[J].Computer Science,2020,47(2):213-220. [12] KIAYIAS A,RUSSELL A,DAVID B,et al.Ouroboros:A provably secure proof-of-stake blockchain protocol[C]//Annual International Cryptology Conference.2017:357-388. [13] AYSU A,GULCAN E,MORIYAMA D,et al.End-to-end Design of a PUF-based Privacy Preserving Authentication Protocol[C]//The annual Conference on Cryptographic Hardware and Embedded Systems.2015:556-576. [14] DELVAUX J,GU D,VERBAUWHEDE I,et al.Efficient Fuzzy Extraction of PUF-Induced Secrets:Theory and Applications [C]//The annual Conference on Cryptographic Hardware and Embedded Systems.2016:412-431. [15] GOPE P,LEE J,QUEK T.Lightweight and Practical Anony-mous Authentication Protocol for RFID Systems Using Physically Unclonable Functions[J].IEEE Trans.Information Forensics and Security,2018,3(11):2831-2843. [16] GOPE P,SIKDAR B.Lightweight and Privacy-Preserving Two-Factor Authentication Scheme for IoT Devices[J].IEEE Internet of Things Journal,2019,6(1):580-589. |
[1] | WANG Zi-kai, ZHU Jian, ZHANG Bo-jun, HU Kai. Research and Implementation of Parallel Method in Blockchain and Smart Contract [J]. Computer Science, 2022, 49(9): 312-317. |
[2] | JIAN Qi-rui, CHEN Ze-mao, WU Xiao-kang. Authentication and Key Agreement Protocol for UAV Communication [J]. Computer Science, 2022, 49(8): 306-313. |
[3] | CHEN Yan-bing, ZHONG Chao-ran, ZHOU Chao-ran, XUE Ling-yan, HUANG Hai-ping. Design of Cross-domain Authentication Scheme Based on Medical Consortium Chain [J]. Computer Science, 2022, 49(6A): 537-543. |
[4] | LI Bo, XIANG Hai-yun, ZHANG Yu-xiang, LIAO Hao-de. Application Research of PBFT Optimization Algorithm for Food Traceability Scenarios [J]. Computer Science, 2022, 49(6A): 723-728. |
[5] | FU Li-yu, LU Ge-hao, WU Yi-ming, LUO Ya-ling. Overview of Research and Development of Blockchain Technology [J]. Computer Science, 2022, 49(6A): 447-461. |
[6] | GAO Jian-bo, ZHANG Jia-shuo, LI Qing-shan, CHEN Zhong. RegLang:A Smart Contract Programming Language for Regulation [J]. Computer Science, 2022, 49(6A): 462-468. |
[7] | MAO Dian-hui, HUANG Hui-yu, ZHAO Shuang. Study on Automatic Synthetic News Detection Method Complying with Regulatory Compliance [J]. Computer Science, 2022, 49(6A): 523-530. |
[8] | ZHOU Hang, JIANG He, ZHAO Yan, XIE Xiang-peng. Study on Optimal Scheduling of Power Blockchain System for Consensus Transaction ofEach Unit [J]. Computer Science, 2022, 49(6A): 771-776. |
[9] | WANG Si-ming, TAN Bei-hai, YU Rong. Blockchain Sharding and Incentive Mechanism for 6G Dependable Intelligence [J]. Computer Science, 2022, 49(6): 32-38. |
[10] | SUN Hao, MAO Han-yu, ZHANG Yan-feng, YU Ge, XU Shi-cheng, HE Guang-yu. Development and Application of Blockchain Cross-chain Technology [J]. Computer Science, 2022, 49(5): 287-295. |
[11] | YANG Zhen, HUANG Song, ZHENG Chang-you. Study on Crowdsourced Testing Intellectual Property Protection Technology Based on Blockchain and Improved CP-ABE [J]. Computer Science, 2022, 49(5): 325-332. |
[12] | REN Chang, ZHAO Hong, JIANG Hua. Quantum Secured-Byzantine Fault Tolerance Blockchain Consensus Mechanism [J]. Computer Science, 2022, 49(5): 333-340. |
[13] | FENG Liao-liao, DING Yan, LIU Kun-lin, MA Ke-lin, CHANG Jun-sheng. Research Advance on BFT Consensus Algorithms [J]. Computer Science, 2022, 49(4): 329-339. |
[14] | SONG Tao, LI Xiu-hua, LI Hui, WEN Jun-hao, XIONG Qing-yu, CHEN Jie. Overview of Research on Security Encryption Authentication Technology of IoV in Big Data Era [J]. Computer Science, 2022, 49(4): 340-353. |
[15] | YANG Xin-yu, PENG Chang-gen, YANG Hui, DING Hong-fa. Rational PBFT Consensus Algorithm with Evolutionary Game [J]. Computer Science, 2022, 49(3): 360-370. |
|