SAC '99 Proceedings of the 6th Annual International Workshop on Selected Areas in Cryptography
Secure Applications of Low-Entropy Keys
ISW '97 Proceedings of the First International Workshop on Information Security
A future-adaptive password scheme
ATEC '99 Proceedings of the annual conference on USENIX Annual Technical Conference
Efficient and robust pseudonymous authentication in VANET
Proceedings of the fourth ACM international workshop on Vehicular ad hoc networks
Anonymous and Traceable Communication Using Tamper-Proof Device for Vehicular Ad Hoc Networks
ICCIT '07 Proceedings of the 2007 International Conference on Convergence Information Technology
Audit and backup procedures for hardware security modules
Proceedings of the 7th symposium on Identity and trust on the Internet
New shielding functions to enhance privacy and prevent misuse of biometric templates
AVBPA'03 Proceedings of the 4th international conference on Audio- and video-based biometric person authentication
Privacy in inter-vehicular networks: why simple pseudonym change is not enough
WONS'10 Proceedings of the 7th international conference on Wireless on-demand network systems and services
Modeling attacks on physical unclonable functions
Proceedings of the 17th ACM conference on Computer and communications security
Cryptographic extraction and key derivation: the HKDF scheme
CRYPTO'10 Proceedings of the 30th annual conference on Advances in cryptology
SP 800-56A. Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography (Revised)
SP 800-56C. Recommendation for Key Derivation through Extraction-then-Expansion
SP 800-56C. Recommendation for Key Derivation through Extraction-then-Expansion
A formal definition and a new security mechanism of physical unclonable functions
MMB'12/DFT'12 Proceedings of the 16th international GI/ITG conference on Measurement, Modelling, and Evaluation of Computing Systems and Dependability and Fault Tolerance
Secure vehicular communication systems: implementation, performance, and research challenges
IEEE Communications Magazine
IEEE Journal on Selected Areas in Communications
PUFKY: a fully functional PUF-based cryptographic key generator
CHES'12 Proceedings of the 14th international conference on Cryptographic Hardware and Embedded Systems
Detecting Sybil attacks in VANETs
Journal of Parallel and Distributed Computing
Hi-index | 0.00 |
Current standardization efforts for cooperative Intelligent Transportation Systems both in the U.S. and Europe foresee vehicles to use a large number of changeable pseudonyms for privacy protection. Provisioning and storage of these pseudonyms require efficient and secure mechanisms to prevent malicious use of pseudonyms. In this paper we investigate several techniques to improve secure and efficient storage of pseudonyms. Specifically, we propose schemes based on Physical Unclonable Functions (PUFs) that allow to replace expensive secure key storage by regular unsecured memory and still provide fully secure pseudonyms storage.