1 |
Y. Hao, T. Han, and Y. Cheng, "A cooperative message authentication protocol in VANETs," in Proceeding of GLOBECOM, Anaheim, CA, pp. 5562-5566, 2012.
|
2 |
J. Chen and J. Wu, "Cooperative anonymity authentication in vehicular networks," in Proceeding of IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, Macau, pp. 1018-1023, 2009.
|
3 |
R. Lu et al, "ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications," in Proceeding of INFOCOM, Phoenix, AZ, pp. 1903-1911, 2008.
|
4 |
Z. Tan, "A privacy-preserving mutual authentication protocol for vehicle Ad Hoc networks," Journal of Convergence Information Technology, vol. 5, no. 7, pp. 180-186, Sep. 2010.
|
5 |
Y. Xi et al, "Probabilistic adaptive anonymous authentication in vehicular networks," Journal of Computer Science and Technology, vol. 23, no. 6, pp. 916-928, Nov. 2008.
DOI
|
6 |
B. Mishra, S. K. Panigrahy, D. Jena, and S. K. Jena, "A secure and efficient message authentication protocol for VANETs with privacy preservation," in Proceeding of World Congress on Information and communication Technologies, Mumbai, pp. 880-885, 2011.
|
7 |
W. Hu, K. Xue, P. Hong, and C. Wu, "ATCS: A novel anonymous and traceable communication scheme for vehicular Ad Hoc networks," International Journal of Network Security, vol. 13, no. 2, pp. 71-78, Sep. 2011.
|
8 |
Z. Ma, F. Kargl, and M. Weber, "Pseudonym-on-demand: a new pseudonym refill strategy for vehicular communications," in Proceeding of IEEE 68th Conference on Vehicular Technology Conference, Calgary, BC, pp. 1-5, 2008.
|
9 |
R. L. Rivest, A. Shamir, and A. Tauman, "How to leak a secret," Lecture notes in Computer Science, pp. 552-565, 2001.
|