[1]Baber Aslam and Cliff Zou, “Distributed Certificate and Application Architecture for VANETs,” Military Communications Conference, pp. 1-7, 2009.
[2]Barzegar M., Mozayani N. and Fathy M., “Secure Safety Messages Broadcasting in Vehicular Network,” International Conference on Advanced Information Networking and Applications Workshops, pp. 1150-1160, 2009.
[3]Caballero-Gil P., Caballero-Gil C., Molina-Gil J. and Hernandez-Goya C., “Flexible Authentication in Vehicular Ad Hoc Networks,” the 15th Asia-Pacific Conference on Communication, pp. 876-879, 2009.
[4]Caballero-Gil P. and Hernandez-Goya C., “Designing Communication-oriented Node Authentication for VANETs,” 6th Annual International Mobile and Ubiquitous Systems: Networking & Services, pp. 13-16, 2009.
[5]Christian Tchepnda, Hassnaa Moustafa, Houda Labiod and Gilles Bourdon, “A Layer-2 Multi-Hop Authentication and Credential Delivery Scheme for Vehicular Networks,” Global Telecommunications Conference, pp. 1-6, 2008.
[6]Christian Tchepnda, Hassnaa Moustafa, Houda Labiod and Gilles Bourdon, “Prioritizing and Enhancing Vehicular Networks Authentication Process Using DSRC Channels Diversity,” IEEE International Conference on Wireless and Mobile Computing, pp. 1-6, 2008.
[7]Etienne Coronado and Soumaya Cherkaoui, “An AAA Study for Service Provisioning in Vehicular Networks,” IEEE Conference on Local Computer Networks, pp. 669-676, 2007.
[8]Haojin Zhu, Rongxing Lu, Xuemin Shen and Xiaodong Lin, “Security in Service-oriented Vehicular Networks,” IEEE Wireless Communications Magazine, pp. 16-22, 2009.
[9]Jiang D. and Delgrossi L., “IEEE 802.11p: Towards an International Standard for Wireless Access in Vehicular Environments,” IEEE Vehicular Technology Conference, pp. 2036-2040, 2008.
[10]Jian Wang and Nan Jiang, “A Simple and Efficient Security Scheme for Vehicular Ad Hoc Networks,” IEEE International Conference on Network Infrastructure and Digital Content, pp. 591-595, 2009.
[11]Jingliang Zhang, Lizhen Ma, Wanli Su and Yumin Wang, “Privacy-Preserving Authentication Based on Short Group Signature in Vehicular Networks,” The First International Symposium on Data, Privacy, and E-Commerce, pp. 138-142, 2007.
[12]Joseph Chee Ming Teo, Lek Heng Ngoh and Huaqun Guo, “An Anonymous DoS-Resistant Password-Based Authentication, Key Exchange and Pseudonym Delivery Protocol for Vehicular Networks,” International Conference on Advanced Information Networking and Applications, pp. 675-682, 2009.
[13]Jun Liu, Xiaoyan Hong, Qunwei Zheng and Lei Tang, “Privacy-Preserving Quick Authentication in Fast Roaming Networks,” Proceedings of IEEE Conference on Local Computer Networks, pp. 975-982, 2006.
[14]Kewei Sha, Yong Xi, Loren Schwiebert and Tao Zhang, “Adaptive Privacy-Preserving Authentication in Vehicular Networks,” First International Conference on Communications and Networking, pp. 25-27, 2006.
[15]Konstantinos Papapanagiotou, Giannis F. Marias and Panagiotis Georgiadis, “A Certificate Validation Protocol for VANETs,” IEEE Globecom Conference, pp. 1-9, 2007.
[16]Lei Zhang, Qianhong Wu, Solanas, A.and Domingo-Ferrer, J., “A Scalable Robust Authentication Protocol for Secure Vehicular Communications,” IEEE Transactions on Vehicular Technology, pp. 1606-1607, 2009.
[17]Nai-Wei Lo and Hsiao-Chien Tsa, “Illusion Attack on VANET Applications - A Message Plausibility Problem,” IEEE Globecom Conference, pp. 1-8, 2007.
[18]Shen Wan, Jian Tang and Wolff, R.S, “Reliable Routing for Roadside to Vehicle Communications in Rural Areas,” IEEE International Conference on Communications, pp. 3017-21, 2008.
[19]Song-Hee Lee, Jin-Young Choi, Yiu and Nam-Sup Park, “FMIPv6 based Secure Binding Update Authentication in Wireless Vehicular Networks,” 4th International Symposium on Wireless Pervasive Computing, pp. 11-13, 2009.
[20]S. S. Manvi, M. S. Kakkasageri and D. G. Adiga, “Message Authentication in Vehicular Ad Hoc Networks: ECDSA Based Approach,” International Conference on Future Computer and Communication, pp. 16-20, 2009.
[21]Sung Hoon Kim, Bum Han Kim, Young Ki Kim and Dong Hoon Lee, “Auditable and Privacy-Preserving Authentication in Vehicular Networks,” The Second International Conference on Mobile Ubiquitous Computing, pp. 19-24 2008.
[22]Tat Wing Chim, Yiu, S.M, Yiu, Hui, L.C.K. and Li, V.O.K., “Security and Privacy Issues for Inter-vehicle Communications in VANETs,” 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks Workshops, pp. 22-26, 2009.
[23]Verma, M. and Dijiang Huang, “SeGCom: Secure Group Communication in VANETs,” 6th IEEE Communications and Networking Conference, pp. 1-5, 2009.
[24]Xiaoyan Sun,Yuanlu Bao and Wolff, R.S, “Performance Analysis of Inter-vehicle Communications in Multilane Traffic Streams,” 22nd International Conference on Advanced Information Networking and Applications Workshops, pp. 1-6, 2009.
[25]Yi Wang, Ahmed, A., Krishnamachari, B. and Psounis, K., “IEEE 802.11p Performance Evaluation and Protocol Enhancement,” IEEE International Conference on Vehicular Electronics and Safety, pp. 317-322, 2008.
[26]王旭正、楊中皇、雷欽隆、ICCL資訊密碼暨建構實驗室,「電腦與網路安全實務」,博碩文化股份有限公司,2009年。
[27]杜建男,「An Efficient Data Dissemination Model for VANETs」,中央大學通訊工程學系碩士論文,2007年。
[28]林羿妏,「世界第一簡單密碼學」,世茂出版有限公司,2009年。
[29]周淑美,「車載網路資訊安全應用之探討」,東華大學資訊工程學系碩士論文,2008年。[30]陳柏全、柯亮宇,「智慧安全車輛與車載無線通訊國際發展趨勢簡介」,財團法人車輛研究測試中心,2008年。[31]柯亮宇、陳柏全,「車間無線通訊標準研究」,財團法人車輛研究測試中心,2008年。
[32]莊耘坤,「可調式家用網路身分認證方法之研究」,世新大學資訊管理學系碩士論文,2008年。[33]粘添壽,「資訊與網路安全技術」,旗標出版股份有限公司,2009年。
[34]黃祥哲、吳惠麟、盧長青、張峰誠、羅浩、潘正祥,「資訊安全原理與實驗」,碁峰資訊股份有限公司,2008年。
[35]賴榮樞,「密碼學與網路安全」,台灣培生教育出版股份有限公司,2007年。
[36]Exclusive or - Wikipedia, the Free Encyclopedia,網址:http://en.wikipedia.org/wiki/Exclusive_or
[37]IEEE 1609 - Family of Standards for Wireless Access in Vehicular Environments (WAVE),網址:http://www.standards.its.dot.gov/fact_sheet.asp?f=80
[38]IEEE 802.11p - Wikipedia, the Free Encyclopedia,網址:http://en.wikipedia.org/wiki/IEEE_802.11p
[39]RFC 2631 – Diffie–Hellman Key Agreement Method ,網址:http://tools.ietf.org/html/rfc2631
[40]Status of Project IEEE 802.11 Task Group p,網址:http://grouper.ieee.org/groups/802/11/Reports/tgp_update.htm