1 |
M..raya and J.Hubaux, "Securing vehicular ad hoc networks," J. of Computer Security, vol. 15, no. 1, pp. 39-68, Jan.2007
|
2 |
X. Lin, X. Sun, P,-H, Ho and X. Shen, "GSIS: A Secure and Privacy Preserving Protocol for Vehicular Communications", IEEE Trans, on Vehicular Technology, vol, 56, no.6, pp.3442-3456, 2007.
DOI
|
3 |
D. Boneh and H. Shacham,"Group signatures with verifier-local revocation," CCS 2004, pp.168-177 ,2004
|
4 |
6. A. Broder and M. Mitzenmacher. Network applications of Bloom filters: A survey. Internet Mathematics, 1(4):485-509, 2004.
DOI
|
5 |
B. Chazelle, J. Kilian, R. Rubinfeld, and A. Tal," The bloomier filter : an efficient data structure for static support lookup tables," in SODA '04: Proceedings of the fifteenth annual ACM-SIAM symposium on Discrete algorithms, (Philadelphia, PA, USA), pp.30-39, Society for Industrial and Applied Mathematics, 2004.
|
6 |
B. Chazelle, J. Kilian, R. Rubinfeld, and A. Tal," The bloomier filter : an efficient data structure for static support lookup tables," in SODA '04: Proceedings of the fifteenth annual ACM-SIAM symposium on Discrete algorithms, (Philadelphia, PA, USA), pp.30-39, Society for Industrial and Applied Mathematics, 2004.
|
7 |
B. H. Bloom, "Space/time trade-offs in hash coding with allowable errors," Communications of the ACM, vol.13, pp.422-426, 1970.
DOI
|