Computer Science ›› 2013, Vol. 40 ›› Issue (9): 152-155.
Previous Articles Next Articles
XU Jun-feng,DING Xue-feng,SI Cheng-xiang and ZHANG Wei
[1] Raya M,Hubaux J P.Securing Vehicular Ad Hoc Networks[J].Journal of Computer Security,Special Issue on Security of Ad Hoc and Sensor Networks,2007,15(1):39-68 [2] Misener J A.Vehicle- infrastructure integration(VII)[J].Intellimotion,2005,11(2):1-3 [3] Lin X,Sun X,Ho P-H,et al.GSIS:A Secure and Privacy-Preserving Protocol for Vehicular Communications[J].IEEE Transactions on Vehicular Technology,2007,56(6):3442-3456 [4] Lin X,Lu R,Zhang C,et al.Security in Vehicular Ad Hoc Networks[J].IEEE Communications Magazine,2008,46(4):88-95 [5] Lin X,Sun X,Wang X,et al.TSVC:Timed Efficient and Secure Vehicular Communications with Privacy Preserving[J].IEEE Transactions on Wireless Communications,2008,7(12):4987-4998 [6] Lu R,Lin X,Zhu H,et al.ECPP:Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications[A]∥The 27th IEEE International Conference on Computer Communications,2008[C].Phoenix,Arizona,USA:Springer-Verlag,2008:15-17 [7] Zhang C,Lin X,Lu R,et al.RAISE:An Efficient RSU-aided Message Authentication Scheme in Vehicular Communication Networks[A]∥IEEE International Conference on Communications (ICC’08),2008[C].Beijing,China:Springer-Verlag,2008:19-23 [8] Zhang C,Lin X,Lu R,et al.An Efficient Message Authentication Scheme for Vehicular Communications[J].IEEE Transactions on Vehicular Technology,2008,57(6):3357-3368 [9] Xi Y,Sha K,Shi W,et al.Enforcing Privacy Using Symmetric Random Key-Set in Vehicular Networks[A]∥Eighth International Symposium on Autonomous Decentralized Systems (ISADS’07),2007[C].New york:Springer-Verlag,2007:344-351 [10] Mak T K,Laberteaux K P,Sengupta R.A Multi-Channel VANET Providing Concurrent Safety and Commercial Services[A]∥Proceedings of 2nd ACM International Workshop on Vehicular Ad Hoc Networks,2005[C].Cologne,Germany:Sringer-Verlag,2005:1-9 [11] Raya M,Hubaux J P.The security of vehicular ad hoc networks[A]∥3rd ACM workshop on Security of ad hoc and sensor networks,2005[C].New York:Springer-Verlag,2005:11-21 [12] Xu Q,Mak T,Ko J,et al.Medium Access Control Protocol Design for Vehicle-Vehicle Safety Messages[J].IEEE Transactions on Vehicular Technology,2007,56(2):499-518 [13] Hubaux J P,Capkun S,Jun L.The Security and Privacy ofSmart Vehicles[J].IEEE Security and Privacy Magazine,2004,2(3):49-55 [14] Xiong Hu,Qin Zhi-guang,Li Fa-gen.Secure Vehicle-to-roadside Communication Protocol Using Certificate-based Cryptosystem [J].IETE Technical Review,2010,27(3):214-219 [15] Shamus Software Ltd.,Miracl library.http://www.sha- mus.ie/index.php?page=home [16] Ren K, Lou W,Zeng K,et al.On broadcast authentication in wireless sensornetworks[J].IEEE Trans.on Wireless Commun.,2007,6(11):4136-4144 [17] Boneh D,Franklin M.Identity-based encryption from the Weilpairing[A]∥CRYPTO 2001,1[C].New York:Springer-Verlag,2001:213-229 [18] Barreto P,Kim H,Bynn B,et al.Efficient algorithms for pairing-based cryptosystems[A]∥CRYPTO 2002,2002[C].New York:Springer-Verlag,2002:354-368 [19] Bao F,Deng R H,Zhu H.Variations of Diffie-Hellman problem[A]∥Proc.ICS,2003[C].New York:Springer-Verlag,2003:301-312 |
No related articles found! |
|