1 |
M. Bellare, J.A. Garay, and T. Rabin, "Fast batch verification for modular exponentiation and digital signatures," In International Conference on the Theory and Applications of Cryptographic Techniques, pp. 236-250, May 1998.
|
2 |
J.K. Liu, T.H. Yuen, M.H. Au, and W. Susilo, "Improvements on an authentication scheme for vehicular sensor networks," Expert Systems with Applications, vol. 41, no. 5, pp. 2559-2564, Apr. 2014.
DOI
|
3 |
N.W. Lo and J.L. Tsai, "An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks without pairings," IEEE Transactions on Intelligent Transportation Systems, vol. 17, no. 5, pp. 1319-1328, May 2016.
DOI
|
4 |
J. Camenisch, S. Hohenberger, and M.O. Pedersen, "Batch verification of short signatures," J. Cryptology, vol. 25, no. 4, pp. 723-747, 2012.
DOI
|
5 |
C. Zhang, R. Lu, X. Lin, P.H. Ho, and X. Shen, "An efficient identitybased batch verification scheme for vehicular sensor networks," Proceeding of IEEE INFOCOM, pp. 246-250, 2008.
|
6 |
M. Raya and J.P. Hubaux, "Securing vehicular ad hoc networks," J. Comput. Security, vol. 15, no. 1, pp. 39-68, 2007.
DOI
|
7 |
X. Lin, X. Sun, P.H. Ho, and X. Shen, "GSIS: A secure and privacypreserving protocol for vehicular communications," IEEE Transactions on Vehicular Technology, vol. 56, no. 6, pp. 3442-3456, Nov. 2007.
DOI
|
8 |
K.A. Shim, "CPAS: An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks," IEEE Transactions on Vehicular Technology, vol. 61, no. 4, pp. 1874-1883, May 2012.
DOI
|
9 |
S.F. Tzeng, S.J. Horng, T. Li, X. Wang, P.H. Huang, and M.K. Khan, "Enhancing security and privacy for identity-based batch verification scheme in VANETs," IEEE Transactions on Vehicular Technology vol. 66, no. 4, pp. 3235-3248, Apr. 2017.
DOI
|
10 |
S. Chatterjee, C. Kamath, and V. Kumar, "Galindo-Garcia identity-based signature revisited," International Conference on Information Security and Cryptology, 2012.
|
11 |
R. Anderson and M.G. Kuhn, "Tamper resistance-a cautionary note," Proceedings of the second Usenix workshop on electronic commerce, vol. 2, pp. 1-11, 1996.
|
12 |
S. Ravi, A. Raghunathan, and S. Chakradhar, "Tamper resistance mechanisms for secure embedded systems," In VLSI Design, 2004. Proceedings. 17th International Conference on, pp. 605-611, 2004.
|
13 |
Y. Wang, H. Zhong, Y. Xu, J. Cui, and F. Guo, "Efficient extensible conditional privacy-preserving authentication scheme supporting batch verification for VANETs," Security and Communication Networks, vol. 9, no. 18, pp. 5460-5471, 2016.
DOI
|
14 |
D. He, N. Kumar, KKR. Choo, and W. Wu, "Efficient hierarchical identity-based signature with batch verification for automatic dependent surveillance-broadcast system," IEEE Transactions on Information Forensics and Security, vol. 12, no. 2, pp. 454-464, Feb. 2017.
DOI
|
15 |
Dedicated Short Range Communications (DSRC). [Online]. Available: http://www.standards.its.dot.gov/Documents/advisories/dsrc_advisory.htm
|