The art of computer programming, volume 3: (2nd ed.) sorting and searching
The art of computer programming, volume 3: (2nd ed.) sorting and searching
Efficient attribute authentication with applications to ad hoc networks
Proceedings of the 1st ACM international workshop on Vehicular ad hoc networks
Security reductions of the second round SHA-3 candidates
ISC'10 Proceedings of the 13th international conference on Information security
Toward revocation data handling efficiency in VANETs
Nets4Cars/Nets4Trains'12 Proceedings of the 4th international conference on Communication Technologies for Vehicles
Hi-index | 0.00 |
This work describes the application of a new version of the Secure Hash Algorithm SHA-3 that was recently chosen as standard, in order to improve the performance of certificate revocation in Vehicular Ad-hoc NETworks (VANETs), which are interesting self-organizing networks. Specifically, we propose the use of both a duplex construction instead of the sponge one present in the SHA-3 version of the Keccak hash function, and a dynamic authenticated data structure based on B-trees, which allows taking advantage of such a construction.