SEARCH

SEARCH BY CITATION

REFERENCES

  • 1
    Li Q, Malip A, Martin KM, Ng S-L, Zhang J. Reputation-based announcement scheme for VANETs. IEEE Transactions on Vehicular Technology 2012; 61(9):40954108.
  • 2
    Chen L, Ng S-L, Wang G. Threshold anonymous announcement in VANETs. IEEE Journal on Selected Areas in Communications 2011; 29:605615.
  • 3
    Calandriello G, Papadimitratos P, Hubaux J-P, Lioy A. Efficient and robust pseudonymous authentication in VANET. In Proceedings of the 4th ACM International Workshop on Vehicular Ad Hoc Networks, ACM: 2007; 1928.
  • 4
    Dötzer F, Fischer L, Magiera P. VARS: a vehicle ad hoc network reputation system. In Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks, volume 1, pages 454456, 2005.
  • 5
    Daza V, Domingo-Ferrer J, Sebé F, Viejo A. Trustworthy privacy-preserving Car generated announcements in vehicular ad hoc networks. IEEE Transaction on Vehicular Technology 2009; 58(4):18761886.
  • 6
    Domingo-Ferrer J, Wu Q, González-Nicolás Ú. Balanced trustworthiness, safety and privacy in vehicle-to-vehicle communications, 2010. To be published in IEEE Transactions on Vehicular Technology. DOI: 10.1109/TVT.2009.2034669.
  • 7
    Golle P, Greene DH, Staddon J. Detecting and correcting malicious data in VANETs. In Proceedings of the 1st ACM International Workshop on Vehicular Ad Hoc Networks, ACM: 2004; 2937.
  • 8
    Lin X, Sun X, Ho P-H. GSIS: secure vehicular communications with privacy preserving. In IEEE Transactions on Vechicular Technology, volume 56, pages 34423456, 2007.
  • 9
    Raya M, Hubaux J-P. Securing vehicular ad hoc networks. Journal of Computer Security 2007; 15(1):3968.
  • 10
    Kounga G, Walter T, Lachmund S. Proving reliability of anonymous information in VANETs. IEEE Transactions on Vehicular Technology 2009; 58(6):29772989.
  • 11
    Minhas UF, Zhang J, Tran T, Cohen R. Towards expanded trust management for agents in vehicular ad hoc networks. In International Journal of Computational Intelligence Theory and Practice (IJCITP), pages 315, 2010.
  • 12
    Finin T, Patwardhan A, Joshi A, Yesha Y. A data intensive reputation management scheme for vehicular ad hoc networks. In Proceedings of the 3rd Annual International Conference on Mobile and Ubiquitous Systems, pages 18, 2006.
  • 13
    Raya M, Aziz A, Hubaux J-P. Efficient secure aggregation in VANETs. In Proceedings of the 3rd International Workshop on Vehicular Ad Hoc Networks, pages 6775. ACM, 2006.
  • 14
    Gutmann P. PKI: It's Not dead, just resting. IEEE Computer 2002; 35(8):4149.
  • 15
    Douceur JR. The Sybil Attack. In IPTPS, Volume 2429 of Lecture Notes in Computer Science, Druschel P, Kaashoek MF, Rowstron AIT, (eds). Springer: 2002; 251260.
  • 16
    Shamir A. Identity-based cryptosystems and signature schemes. In CRYPTO, pages 4753, 1984.
  • 17
    Boneh D, Franklin MK. Identity-Based Encryption from the Weil Pairing. In CRYPTO, Volume 2139 of Lecture Notes in Computer Science. Springer, 2001; 213229.
  • 18
    Al-Riyami SS, Paterson KG. Certificateless Public Key Cryptography. In ASIACRYPT, Volume 2894 of Lecture Notes in Computer Science. Springer, 2003; 452473.
  • 19
    Zhang Z, Wong DS, Xu J, Feng D. Certificateless public-Key signature: security model and efficient construction. In ACNS, volume 3989 of Lecture Notes in Computer Science, pages 293308, 2006.
  • 20
    Papadimitratos P, Buttyan L, Holczer T, Schoch E, Freudiger J, Raya M, Ma Z, Kargl F, Kung A, Hubaux J-P. Secure vehicular communication systems: design and architecture. IEEE Communications Magazine 2008:100109.
  • 21
    Parno B, Perrig A. Challenges in securing vehicular networks. In Proceedings of Workshop on Hot Topics in Networks (HotNets-IV), 2005.
  • 22
    Boneh D, Shacham H. Group signatures with verifier-local revocation. In ACM Conference on Computer and Communications Security, pages 168177, 2004.
  • 23
    Brown M, Hankerson D, López J, Menezes A. Software Implementation of the NIST Elliptic Curves Over Prime Fields. In CT-RSA, Lecture Notes in Computer Science. Springer, 2001; 250265.
  • 24
    IEEE 1363a. IEEE standard specifications for public Key cryptography—amendment 1: additional technique, 2004.
  • 25
    Johnson D, Menezes A, Vanstone SA. The elliptic curve digital signature algorithm (ECDSA). International Journal of Information Security 2001; 1(1):3663.
  • 26
    Chen L, Morrissey P, Smart NP. DAA: fixing the pairing-based protocols. IACR Cryptology ePrint Archive, page 198, 2009. Available at http://eprint.iacr.org/2009/198
  • 27
    ASTM E2213-03. Standard specification for telecommunications and information exchange between roadside and vehicle systems—5 GHz band dedicated short range communications (DSRC) medium access control (MAC) and physical layer (PHY) specification, 2003.
  • 28
    Koblitz N, Menezes A. Pairing-based cryptography at high security levels. In IMA Int. Conf., pages 1336, 2005.
  • 29
    Raya M, Hubaux J-P. The security of vehicular ad hoc networks. In Proceeding of SASN, pages 1121. ACM, 2005.