|
[1]Y. Qin, D. Huang, and X. Zhang, “VehiCloud: Cloud computing facilitating routing in vehicular networks,” Proc. 11th IEEE Int. Conf. Trust. Secur. Priv. Comput. Commun. Trust. - 11th IEEE Int. Conf. Ubiquitous Comput. Commun. IUCC-2012, pp. 1438–1445, 2012. [2]W. He, G. Yan, and L. Da Xu, “Developing vehicular data cloud services in the IoT environment,” IEEE Trans. Ind. Informatics, vol. 10, no. 2, pp. 1587–1595, 2014. [3]M. Whaiduzzaman, M. Sookhak, A. Gani, and R. Buyya, “A survey on vehicular cloud computing,” J. Netw. Comput. Appl., vol. 40, no. 1, pp. 325–344, 2014. [4]H. Abid, L. T. T. Phuong, J. Wang, S. Lee, and S. Qaisar, “V-Cloud,” Proc. 4th Int. Symp. Appl. Sci. Biomed. Commun. Technol. - ISABEL ’11, pp. 1–5, 2011. [5]A. T. Dimal Baby, R. D. Sabareesh, R. A. K. Saravanaguru, “VCR: vehicular cloud for road side scenarios. In Advances in Computing and Information Technology,” Adv. Intell. Syst. Comput. [6]S. Olariu, M. Eltoweissy, and M. Younis, “Towards autonomous vehicular clouds,” ICST Trans. Mob. Commun. Appl., vol. 11, no. 7–9, p. e2, 2011. [7]N. Fernando, S. W. Loke, and W. Rahayu, “Mobile cloud computing: A survey,” Futur. Gener. Comput. Syst., vol. 29, no. 1, pp. 84–106, 2013. [8]R. Wallner, D., Harder, E., & Agee, “Key management for multicast: Issues and architectures,” Tech. Rep. RFC 2627,Internet Eng. Task Force, 1999. [9]S. S. Wong, C. K., Gouda, M., & Lam, “Secure group communications using key graphs,” ACM SIGCOMM Comput. Commun. Rev., 1998. [10]P. Mell and T. Grance, “The NIST Definition of Cloud Computing Recommendations of the National Institute of Standards and Technology,” Nist Spec. Publ., vol. 145, p. 7, 2011. [11]P. Dinh, H. T., Lee, C., Niyato, D., & Wang, “A survey of mobile cloud computing: architecture, applications, and approaches,” Wirel. Commun. Mob. Comput., vol. 13(18), no. October 2011, pp. 1587–1611, 2013. [12]“Blind signatures for untraceable payments,” Adv. cryptology. Springer US, pp. 199–203, 1983. [13]C.-T. Li, M.-S. Hwang, and Y.-P. Chu, “A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks,” Comput. Commun., vol. 31, no. 12, pp. 2803–2814, 2008. [14]G. Broenink, J.-H. Hoepman, C. V. ’T Hof, R. van Kranenburg, D. Smits, and T. Wisman, “The Privacy Coach: Supporting customer privacy in the Internet of Things,” p. 10, 2010. [15]“Dutch interdisciplinary forum on RFID,” http://www.difr.nl/. . [16]D. Boneh and M. Franklin, “Identity-Based Encryption from the Weil Pairing,” SIAM J. Comput., vol. 32, no. 3, pp. 586–615, 2003. [17]L. Ben, B. Dan, and S. Hanav, “Short Signature from the Weil Pairing,” J. Cryptol., vol. Vol.17,No., 2004. [18]D. Boneh, C. Gentry, B. Lynn, and H. Shacham, “Aggregate and Verifiably Encrypted Signatures from Bilinear Maps,” EUROCRYPT 2003 Adv. Cryptol., pp. 416–432, 2003. [19]M. Blaze, M., Bleumer, G., Strauss, “Divertible Protocols and Atomic Proxy Cryptography,” Adv. Cryptology—EUROCRYPT’98. Springer Berlin Heidelb., pp. 127–144, 1998. [20]G. Ateniese, K. Fu, M. Green, and S. Hohenberger, “Improved proxy re-encryption schemes with applications to secure distributed storage,” ACM Trans. Inf. Syst. Secur., vol. 9, no. 1, pp. 1–30, 2006. [21]and G. A. Green, Matthew, “Identity-Based Proxy Re-Encryption,” Springer Berlin Heidelberg., pp. 1–21. [22]A. T. Sherman and D. a. McGrew, “Key establishment in large dynamic groups using one-way function trees,” IEEE Trans. Softw. Eng., vol. 29, no. 5, pp. 444–458, 2003. [23]W. H. D. Ng, M. Howarth, Z. Sun, and H. Cruickshank, “Dynamic balanced key tree management for secure multicast communications,” IEEE Trans. Comput., vol. 56, no. 5, pp. 590–605, 2007. [24]I. C. Lin, S. S. Tang, and C. M. Wang, “Multicast key management without rekeying processes,” Comput. J., vol. 53, no. 7, pp. 939–950, 2010. [25]J. W. Mukherjee, R., & Atwood, “Proxy encryptions for secure multicast key management,” Local Comput. Networks, 2003. LCN’03. Proceedings. 28th Annu. IEEE Int. Conf. on. IEEE, pp. 377–384, 2003. [26]Y. P. Chiu, C. Y. Huang, and C. L. Lei, “Sempre: Secure multicast architecture using proxy Re-Encryption,” Int. J. Innov. Comput. Inf. Control, vol. 8, no. 7 A, pp. 4719–4748, 2012. [27]Y. R. Chen, J. D. Tygar, and W. G. Tzeng, “Secure group key management using uni-directional proxy re-encryption schemes,” Proc. - IEEE INFOCOM, pp. 1952–1960, 2011. [28]R. L. Rivest, a. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Commun. ACM, vol. 21, no. 2, pp. 120–126, 1978. [29]E. Theodoridis, G. Mylonas, and I. Chatzigiannakis, “Developing an IoT Smart City framework,” IISA 2013 - 4th Int. Conf. Information, Intell. Syst. Appl., pp. 180–185, 2013. [30]Y. Zhao, “Telematics: Safe and fun driving,” IEEE Intell. Syst. Their Appl., vol. 17, no. 1, pp. 10–14, 2002. [31]Y. Yang and R. Bagrodia, “Evaluation of VANET-based advanced intelligent transportation systems,” Proc. sixth ACM Int. Work. Veh. InterNETworking VANET 09, p. 3, 2009. [32]F. Dötzer, “Privacy issues in vehicular ad hoc networks,” Springer Berlin Heidelberg., pp. 197–209. [33]M. Yousefi, S., Mousavi, M. S., & Fathy, “Vehicular ad hoc networks (VANETs): challenges and perspectives,” ITS Telecommun. Proceedings, 2006 6th Int. Conf. IEEE, pp. 761–766. [34]M. Raya, D. Jungels, P. Papadimitratos, I. Aad, J. Hubaux, and C. Sciences, “Certificate Revocation in Vehicular Networks,” System, pp. 1–10, 2006. [35]A. Studer, E. Shi, F. Bai, and A. Perrig, “TACKing together efficient authentication, revocation, and privacy in VANETs,” 2009 6th Annu. IEEE Commun. Soc. Conf. Sensor, Mesh Ad Hoc Commun. Networks, SECON 2009, 2009. [36]R. Panayappan and J. Trivedi, “VANET-based approach for parking space availability,” Proc. fourth …, pp. 75–76, 2007. [37]R. Lu, X. Lin, H. Zhu, and X. Shen, “SPARK: A new VANET-based smart parking scheme for large parking lots,” Proc. - IEEE INFOCOM, pp. 1413–1421, 2009. [38]D. M. Bavkar, T. E. College, and N. Mumbai, “PAV : Parking Allotment for Vehicles using VANET,” vol. 2, no. 2, pp. 68–76. [39]H. Song, S. Zhu, and G. Cao, “SVATS : A Sensor-network-based Vehicle Anti-Theft System,” INFOCOM 2008. 27th Conf. Comput. Commun. IEEE. IEEE, pp. 171–175, 2008. [40]M. H. Park, G. P. Gwon, S. W. Seo, and H. Y. Jeong, “RSU-based distributed key management (RDKM) for secure vehicular multicast communications,” IEEE J. Sel. Areas Commun., vol. 29, no. 3, pp. 644–658, 2011. [41]D. Je, Y. Choi, and S. Seo, “Subscription-Period-Aware Key Management for Secure Vehicular Multicast Communications,” vol. 62, no. 9, pp. 4213–4227, 2013. [42]V. Technology and I. Transactions, “Subscription-Period-Aware Key Management for Secure Vehicular Multicast Communications,” Veh. Technol. IEEE Trans., vol. 62, pp. 4213–4227, 2013.
|