1 |
B.H.Hwang, D.H.Lee, "An efficient authentication protocol between vehicle and communication infrastructure for intelligent vehicular networks", proceeding of the ITFE Summer conference, pp 500-503,August, 2008.
|
2 |
M..raya and J.Hubaux, "Securing vehicular ad hoc networks," J. of Computer Security, vol. 15, no. 1, pp. 39-68, Jan.2007
|
3 |
X. Lin, X. Sun, P,-H, Ho and X. Shen, "GSIS: A Secure and Privacy Preserving Protocol for Vehicular Coomunications", IEEE Trans, on Vehicular Technology, vol, 56, no.6, pp.3442-3456, 2007.
|
4 |
Hoare, C.A.R., Communication Sequential Porcesses, Prentice-Hall, 1985 N), LNCS, pp 149-164, 2004.
|
5 |
G. Calandriello, P. Papadimitratos and J. P. Hu baux, "Efficient and Robust Pseudonymous Authentication in VANET," In Proc. International Workshop VANET, pp. 19-28, 2007.
|
6 |
Hoare, C.A.R, Communicating Sequential Proces ses, Prentice-Hall, 1985.
|
7 |
Formal System Ltd, FDR2 User Manual, Aug, 1999.
|
8 |
Lowq, G., "Casper: A Compiler for the analysis of Security Protocols," In Proc. of the 1997 IEEE Computer Security Foundation Workshop X, IEEE Computer Society, Silver Spring, MD, pp, 18-30, 1997.
|
9 |
G. Calandriello, P. Papadimitratos and J. P. Hub aux, "Efficient and Robust Pseudonymous Auth entication in VANET, " In Proc. International Workshop VANET, pp.19-28, 2007.
|
10 |
J. Zhang, L. Ma, W. Su, and Y. Wang, "Privacy-Preserving Authentication Based on Short Group Signature in Vehicular Networks," Proceedings of the First International Symposium on Data, Privacy, and E-Commerce, pp. 138-142,
|