Security without identification: transaction systems to make big brother obsolete
Communications of the ACM
Proceedings of the tenth annual ACM-SIAM symposium on Discrete algorithms
Software Implementation of the NIST Elliptic Curves Over Prime Fields
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
Broadcast reception rates and effects of priority access in 802.11-based vehicular ad-hoc networks
Proceedings of the 1st ACM international workshop on Vehicular ad hoc networks
Vehicle-to-vehicle safety messaging in DSRC
Proceedings of the 1st ACM international workshop on Vehicular ad hoc networks
Detecting and correcting malicious data in VANETs
Proceedings of the 1st ACM international workshop on Vehicular ad hoc networks
Proceedings of the 11th ACM conference on Computer and communications security
Group signatures with verifier-local revocation
Proceedings of the 11th ACM conference on Computer and communications security
The security of vehicular ad hoc networks
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Proceedings of the 9th ACM international symposium on Modeling analysis and simulation of wireless and mobile systems
The Threat of Intelligent Collisions
IT Professional
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Pseudonymous PKI for ubiquitous computing
EuroPKI 2006 Proceedings of the Third European conference on Public Key Infrastructure: theory and Practice
Foundations of group signatures: the case of dynamic groups
CT-RSA'05 Proceedings of the 2005 international conference on Topics in Cryptology
SECURING VEHICULAR COMMUNICATIONS
IEEE Wireless Communications
Anonysense: privacy-aware people-centric sensing
Proceedings of the 6th international conference on Mobile systems, applications, and services
Report on the "secure vehicular communications: results and challenges ahead" workshop
ACM SIGMOBILE Mobile Computing and Communications Review
Secure and efficient beaconing for vehicular networks
Proceedings of the fifth ACM international workshop on VehiculAr Inter-NETworking
Revocation games in ephemeral networks
Proceedings of the 15th ACM conference on Computer and communications security
Pairing-based message authentication scheme with privacy protection in vehicular ad hoc networks
Mobility '08 Proceedings of the International Conference on Mobile Technology, Applications, and Systems
AnonySense: Opportunistic and Privacy-Preserving Context Collection
Pervasive '08 Proceedings of the 6th International Conference on Pervasive Computing
Efficient user revocation for privacy-aware PKI
Proceedings of the 5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness
Probabilistic adaptive anonymous authentication in vehicular networks
Journal of Computer Science and Technology
On non-cooperative location privacy: a game-theoretic analysis
Proceedings of the 16th ACM conference on Computer and communications security
TACKing together efficient authentication, revocation, and privacy in VANETs
SECON'09 Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks
Towards Privacy Aware Pseudonymless Strategy for Avoiding Profile Generation in VANET
Information Security Applications
On the efficiency of secure beaconing in VANETs
Proceedings of the third ACM conference on Wireless network security
PPAA: peer-to-peer anonymous authentication
ACNS'08 Proceedings of the 6th international conference on Applied cryptography and network security
Analysis of ECDSA authentication processing in VANETs
NTMS'09 Proceedings of the 3rd international conference on New technologies, mobility and security
Preserving privacy in participatory sensing systems
Computer Communications
Privacy in inter-vehicular networks: why simple pseudonym change is not enough
WONS'10 Proceedings of the 7th international conference on Wireless on-demand network systems and services
P2-CTM: privacy preserving collaborative traffic monitoring
Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS
Conditional privacy through ring signature in vehicular ad-hoc networks
Transactions on computational science XIII
Journal of Network and Computer Applications
Policy Management for Secure Data Access Control in Vehicular Networks
Journal of Network and Systems Management
APPA: aggregate privacy-preserving authentication in vehicular Ad Hoc networks
ISC'11 Proceedings of the 14th international conference on Information security
Secure service discovery protocol for intelligent transport systems: proof of correctness
Proceedings of the first ACM international symposium on Design and analysis of intelligent vehicular networks and applications
Proceedings of the 4th ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS
Preserving security and privacy in large-scale VANETs
ICICS'11 Proceedings of the 13th international conference on Information and communications security
The UNESCO chair in data privacy research in vehicular networks
DPM'09/SETOP'09 Proceedings of the 4th international workshop, and Second international conference on Data Privacy Management and Autonomous Spontaneous Security
Security and Communication Networks
Security solutions for highly dynamic car2x networks in the KoFAS initiative
Nets4Cars/Nets4Trains'12 Proceedings of the 4th international conference on Communication Technologies for Vehicles
Identification, authentication and tracking algorithm for vehicles using VIN in distributed VANET
Proceedings of the International Conference on Advances in Computing, Communications and Informatics
International Journal of Business Data Communications and Networking
VeSPA: vehicular security and privacy-preserving architecture
Proceedings of the 2nd ACM workshop on Hot topics on wireless network security and privacy
Short-Term linkable group signatures with categorized batch verification
FPS'12 Proceedings of the 5th international conference on Foundations and Practice of Security
Security challenges for the intelligent transportation system
Proceedings of the First International Conference on Security of Internet of Things
Implementation of SHA-1 and ECDSA for vehicular ad-hoc network using NS-3
Proceedings of the 2nd annual conference on Research in information technology
Efficient communication scheme with confidentiality and privacy for vehicular networks
Computers and Electrical Engineering
Efficient and secure storage of private keys for pseudonymous vehicular communication
Proceedings of the 2013 ACM workshop on Security, privacy & dependability for cyber vehicles
Improvements on an authentication scheme for vehicular sensor networks
Expert Systems with Applications: An International Journal
Aggregation and probabilistic verification for data authentication in VANETs
Information Sciences: an International Journal
Review: Information management in vehicular ad hoc networks: A review
Journal of Network and Computer Applications
Mutual authentication in self-organized VANETs
Computer Standards & Interfaces
Hi-index | 0.00 |
Effective and robust operations, as well as security and privacy are critical for the deployment of vehicular ad hoc networks (VANETs). Efficient and easy-to-manage security and privacy-enhancing mechanisms are essential for the wide-spread adoption of the VANET technology. In this paper, we are concerned with this problem; and in particular, how to achieve efficient and robust pseudonym-based authentication. We design mechanisms that reduce the security overhead for safety beaconing, and retain robustness for transportation safety, even in adverse network settings. Moreover, we show how to enhance the availability and usability of privacy-enhancing VANET mechanisms: Our proposal enables vehicle on-board units to generate their own pseudonyms, without affecting the system security.