A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks
- 1 July 2008
- journal article
- Published by Elsevier BV in Computer Communications
- Vol. 31 (12), 2803-2814
- https://doi.org/10.1016/j.comcom.2007.12.005
Abstract
No abstract availableKeywords
This publication has 18 references indexed in Scilit:
- Secure communications for cluster-based ad hoc networks using node identitiesJournal of Network and Computer Applications, 2007
- Security requirements and solution concepts in vehicular ad hoc networksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2007
- POSITION VERIFICATION APPROACHES FOR VEHICULAR AD HOC NETWORKSIEEE Wireless Communications, 2006
- Improved security in geographic ad hoc routing through autonomous position verificationPublished by Association for Computing Machinery (ACM) ,2006
- The quest for personal control over mobile location privacyIEEE Communications Magazine, 2004
- Enhancing location privacy in wireless LAN through disposable interface identifiersPublished by Association for Computing Machinery (ACM) ,2003
- A remote user authentication scheme using hash functionsACM SIGOPS Operating Systems Review, 2002
- A non-interactive public-key distribution systemDesigns, Codes and Cryptography, 1996
- A public key cryptosystem and a signature scheme based on discrete logarithmsIEEE Transactions on Information Theory, 1985
- Blind Signature SystemPublished by Springer Science and Business Media LLC ,1984