1 |
U. Lee, R. Cheung and M. Gerla, "Emerging Vehicular Applications," Vehicular Networks: from theory to practice, S. Olariu and M. C. Weigle, eds., BocaRaton, FL: Taylor and Francis, pp. 1-30, 2009.
|
2 |
M. Raya and J.-P. Hubaux, "Securing Vehicular Ad Hoc Networks," Journal of Computer Security, vol. 15, pp. 39-68, 2007.
DOI
|
3 |
F. Kargl, P. Papadimitratos, L. Buttyan, M. Muter, E. Schoch, B. Wiedersheim, T. Ta-Vinh, G. Calandriello, A. Held, A. Kung, and J. P. Hubaux, "Secure vehicular communication systems: implementation, performance, and research challenges," Communications Magazine, IEEE, vol. 46, pp. 110-118, 2008.
|
4 |
X. Lin, R. Lu, C. Zhang, H. Zhu, P.-H. Ho, and X. Shen, "Security in Vehicular Ad Hoc Networks," IEEE Communications Magazine, vol. 46, no. 4, pp. 88-95, 2008.
|
5 |
D. Huang, S. Misra, M. Verma, G. Xue, "PACP: An Efficient Pseudonymous Authentication-Based Conditional Privacy Protocol for VANETs," Intelligent Transportation Systems, IEEE Transactions on, vol.12, no.3, pp.736,746, Sept. 2011.
|
6 |
J. Sun, C. Zhang, Y. Zhang, and Y. Fang, "An Identity-based Security System for User Privacy in Vehicular Ad Hoc Networks," IEEE Transactions on Parallel and Distributed Systems, vol. 21, no. 9, pp. 1227-1239, 2010.
DOI
|
7 |
R. Lu, X. Lin, H. Zhu, P.-H. Ho, and X. Shen, "ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications," in Proc. IEEE International Conference on Computer Communications (INFOCOM), pp. 1229-1237, 2008.
|
8 |
Y. Sun, R. Lu, X. Lin, X. Shen, and J. Su, "An Efficient Pseudonymous Authentication Scheme With Strong Privacy Preservation for Vehicular Communications," IEEE Transactions on Vehicular Technology, vol. 59, no. 7, pp. 3589-3603, 2010.
DOI
|
9 |
B. Wiedersheim, Z. Ma, F. Kargl, P. Papadimitratos, "Privacy in inter- vehicular networks: Why simple pseudonym change is not enough," Wireless On-demand Network Systems and Services (WONS), 2010 Seventh International Conference on, pp.176,183, Feb. 2010.
|
10 |
E. Fonseca, A. Estag, R. Baldessari, R. L. Aguiar, "Support of Anonymity in VANETs - Putting Pseudonymity into Practice," Wireless Communications and Networking Conference, 2007.WCNC 2007. IEEE, pp.3400,3405, 11-15 March 2007.
|
11 |
Z. Ma, F. Kargl, and M. Weber, "Pseudonym-on-demand: a new pseudonym refill strategy for vehicular communications," in Vehicular Technology Conference, 2008. VTC 2008-Fall. IEEE 68th. IEEE, pp. 1-5, 2008.
|
12 |
R. Lu, X. Li, T. H. Luan, X. Liang, and X. Shen, "Pseudonym changing at social spots: An effective strategy for location privacy in vanets," Vehicular Technology, IEEE Transactions on, vol. 61, no. 1, pp. 86-96, 2012.
DOI
|
13 |
A. R. Beresford and F. Stajano, "Mix zones: User privacy in location aware services," in Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second IEEE Annual Conference on. IEEE, pp. 127-131, 2004.
|
14 |
D. Eckhoff, C. Sommer, T. Gansen, R. German, and F. Dressler, "Strong and affordable location privacy in vanets: Identity diffusion using timeslots and swapping," in Vehicular Networking Conference (VNC), 2010 IEEE. IEEE, pp. 174-181, 2010.
|
15 |
B. K. Chaurasia and S. Verma, "Maximizing anonymity of a vehicle through pseudonym updation," in Proceedings of the 4th Annual International Conference on Wireless Internet. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), p. 83, 2008.
|
16 |
V. S. Miller, "Use of elliptic curves in cryptography," in Advances in Cryptology CRYPTO'85 Proceedings. Springer, pp. 417-426, 1986.
|
17 |
R. Hussain, S. Kim, and H. Oh, "Towards Privacy Aware Pseudonymless Strategy for Avoiding Profile Generation in VANET," in Information Security Applications, Y. Heung Youl and Y. Moti, Eds., ed: Springer-Verlag, pp. 268-280, 2009.
|
18 |
T. ElGamal, "A public key cryptosystem and a signature scheme based on discrete logarithms," Information Theory, IEEE Transactions on, vol. 31, no. 4, pp. 469- 472, 1985.
DOI
|
19 |
D. Kim, J. Choi, and S. Jung, "Mutual identification and key exchange scheme in secure vanets based on group signature," in Consumer Communications and Networking Conference (CCNC), 2010 7th IEEE. pp. 1-2, 2010.
|