|
[1] Hartenstein, H. and Laberteaux, K.P., ”A Tutorial Survey on Vehicular Ad Hoc Networks”, IEEE Communications Magazine. ,pp 164-171, June 2008. [2] Toor, Y., Muhlethaler, P., Laouiti, A., ”Vehicle ad hoc networks: applications and related technical issues”, IEEE Communications Surveys and Tutorials. ,pp. 74 - 88, 3rd Quarter 2008. [3] U.S. Dept. Transp., ” Nat. Highway Traffic Safety Admin.”, Vehicle Safety Communications Project. 2006. [4] S. Lee, G. Pan, J. Park, M. Gerla, and S. Lu, ” Secure incentives for commercial ad dissemination in vehicular networks”, in Proc. ACM Int Symp. MobiHoc ,pp. 150-159, 2007. [5] IEEE P802.11p/D6. Draft Amendment for Wireless Access in Vehicular Environments (WAVE) ,March 2009. [6] Dedicated Short Range Communication (DSRC). [Online]. Available: http://grouper.ieee.org/groups/scc32/dsrc/index.html. [7] Jean-Pierre Hubaux, Srdjan Capkun and Jun Luo, ”The Security and Privacy of Smart Vehicles”, IEEE Security and Privacy ,vol. 2, no. 3, pp. 49-55, May 2004. [8] C. Zhang, X. Lin, R. Lu, P.-H. Ho and X. Shen, ”An Efficient Message Authentication scheme for Vehicular Communications”, IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY ,VOL. 57, NO. 6, NOV. 2008. [9] Gina Kounga, Member, IEEE, Thomas Walter, Member, IEEE, and Sven Lachmund, Member, IEEE, ”Proving Reliability of Anonymous Information in VANETs”, IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY ,VOL. 58, NO. 6, July 2009. [10] Lu, R., Lin, X., Zhu, H. and Shen, X.” An Intelligent Secure and Privacy-Preserving Parking Scheme Through Vehicular Communications”, IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY , VOL. 59, NO. 6, July 2010. [11] Wasef, A., Yixin Jiang and Xuemin Shen, “DCS: An Efficient Distributed-Certificate-Service Scheme for Vehicular Networks”, IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 59, NO. 2, FEBRUARY 2010. [12] Hsin-Te Wu and Wen-Shyong Hsieh, “A Novel RSU-based Message Authentication Scheme for VANET”, The Fifth International Conference on Systems and Networks Communications , August 22-27, 2010. [13 ] Gamage, Chandana, Gras, Ben, Crispo, Bruno, and Tanenbaum, Andrew S, “An Identity-based Ring Signature Scheme with Enhanced Privacy”, Securecomm and Workshops, 2006, Aug. 28 2006. [14] Jinyuan Sun, Chi Zhang, Yanchao Zhang,and Yuguang Fang, “An Identity-Based Security System for User Privacy in Vehicular Ad Hoc Networks”, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 21, NO. 9, SEPTEMBER 2010. [15] Lei Zhang, Qianhong Wu, Agusti Solanas, Josep Domingo-Ferrer, “A Scalable Robust Authentication Protocol for Secure Vehicular Communications”, IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 59, NO. 4, MAY 2010 [16] Jiun-Long Huang, Lo-Yao Yeh, and Hung-Yu Chien, “ABAKA: An Anonymous Batch Authenticated and Key Agreement Scheme for Value-Added Services in Vehicular Ad Hoc Networks”, IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 60, NO. 1, JANUARY 2011 [17] D. Boneh and M. Franklin, “Identity-Based Encryption from the Weil Pairings,” Advances in Cryptology-Asiacrypt, Springer-Verlag, pp. 514-532, 2001. [18] H. Krawczyk and T. Rabin, “Chameleon signatures,” in Proc. NDSS, 2000, pp. 143-154, 2000. [19] Jaeduck Choi and Souhwan Jung, “A Handover Authentication Using Credentials Based on Chameleon hashinging”, IEEE COMMUNICATIONS LETTERS, VOL. 14, NO. 1, JANUARY 2010 [20] D. Boneh, B. Lynn, and H. Shacham, “Short signatures from the Weil pairing,” J. Cryptol., vol. 17, no. 4, pp. 297–319, Sep. 2004. [21] M. Scott, “Computing the Tate pairing,” in Topics in Cryptology. Berlin, Germany: Springer-Verlag, 2005, pp. 293–304. [22] A. Miyaji, M. Nakabayashi, and S. Takano, “New explicit conditions of elliptic curve traces for FR-reductions,” IEIC Tech. Rep., vol. 100, no. 323, pp. 99–108, 2000. [23]ECC and Bilinear Pairing Software Library, http://www.cs.cityu.edu.hk/~ecc/software/lib_about.htm. [24] Albert Wasef, and Xuemin Shen, “EDR: Efficient Decentralized Revocation Protocol for Vehicular Ad Hoc Networks,” IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 58, NO. 9, NOVEMBER 2009
|