Acknowledgement
Supported by : 학술진흥재단
References
- H. Hartenstein and K. P. Laberteaux, ''A Tutorial Survey on Vehicular Ad Hoc Networks," IEEE Communications Magazine, vol. 46, no. 6, pp. 164 -171, Jun . 2008.
- Y. Toor, P. Muhlethaler, A. Laouiti, and A. Fortelle, "Vehicular ad hoc networks: Applications and related technical issues," IEEE Communication Survey & Tutorial, vol. 10, no. 3, pp. 74-88, 2008. https://doi.org/10.1109/COMST.2008.4625806
- F. Kargl, P. Papadimitratos, L. Buttyan, M. Muter, E. Schoch, B. Wiedersheim, B. Ta-Vinh Thong, G. Calandriello, A. Held, A. Kung, and J.-P. Hubaux, "Secure vehicular communication systems: Design and Architecture," IEEE Communications Magazine, vol. 46, no. 11, pp. 100-109, Nov. 2008.
- A. Kiayias, Y. Tsiounis, and M. Yung, "Traceable signatures," Advances in Cryptology, Eurocrypt 2004, LNCS 3027, pp. 571-589, 2004.
- S.G. Choi. K. Park, and M. Yung, "Short traceable signatures based on bilinear pairings," Proceedings of the 1st International Workshop on Security, IWSEC 2006, LNCS 4266, pp. 88-103, 2006.
- D. Boneh, X. Boyen, and H. Shacham, "Short group signatures," Advances in Cryptology, Crypto 2004, LNCS 3152, pp. 41-55, 2004.
- M. Raya and J.-P. Hubaux, "Securing Vehicular Ad Hoc Networks," Journal of Computer Security, vol. 15, no. 1, pp. 39-68, Jan. 2007. https://doi.org/10.3233/JCS-2007-15103
- C. Zhang, R. Lu, X. Lin, P. Ho, and X. Shen, ''An Efficient Identity-based Batch Verification Scheme for Vehicular Sensor Networks," Proceedings of the IEEE INFOCOM 2008, pp. 246-350, Apr. 2008.
- 김상진, 임지환, 오희국, "VANET을 위한 차량자체생성 조건부익명 인증시스템," 정보보호학회논문지, vol. 19, no. 4, pp. 105-114, 2009년 8월.
- 김상진, 이병우, 오희국, "VANET을 위한 차량자체 갱신가능 익명ID 시스템," 정보보호학회논문지, vol. 19, no. 5, pp. 93-103, 2009년 10월.
- R. Hussain, S. Kim, and H. Oh, "Towards privacy aware pseudonymless strategy for avoiding profile generation in VANET," Proceedings of the 10th International Workshop on Information Security Applications, WISA 2009, LNCS 5932, pp. 268-280, 2009.
- 오종택, "미국의 5.9GHz 차세대 DSRC 주파수 및 표준화 현황," TTA Journal, No. 98, pp. 122-132, 2005년 4월.
- R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin, "Secure distributed key generation for discrete-log based cryptosystems," Advances in Cryptology, Eurocrypt 1999, LNCS 1592, pp. 295-310, 1999.
- T. ElGamal, "A public key cryptosystem and a signature scheme based on discrete logarithms," Advances in Cryptology. Crypto 1984, LNCS 196, pp. 10-18, 1984.