[1]Parno B,Perrig A. Challenges in Securing Vehicular Networks[C]∥Proc of the Fourth Workshop on Hot Topics in Networks, 2005:16.
[2]Raya M, Hubaux J P. Securing Vehicular Ad Hoc Networks[J]. Journal of Computer Security, 2007, 15(1):3968.
[3]Boneh D,Shacham H. Group Signatures with VerifierLocal Revocation[C]∥Proc of ACM CCS’04, 2004:168177.
[4]Lin X, Sun X, Ho PH, et al. GSIS: A Secure and Privacy Preserving Protocol for Vehicular Communications[J]. IEEE Transactions on Vehicular Technology, 2007,56(6):34423456.
[5]Guo J, Baugh J P, Wang S. A Group Signature Based Secure and PrivacyPreserving Vehicular Communication Framework[C]∥Proc of the Mobile Networking for Vehicular Environments (MOVE) Workshop in Conjunction with IEEE INFOCOM, 2007:103108.
[6]Calandriello G, Papadimitratos P, Hubaux JP, et al .Efficient and Robust Pseudonymous Authentication in Vanet[C]∥Proc of the 4th ACM International Workshop on Vehicular Ad Hoc Networks, 2007:1928.
[7]Hao Y,Cheng Y,Ren K.Distributed Key Management with Protection Against RSU Compromise in Group Signature Based VANETs[C]∥Proc of IEEE GLOBECOM’08, 2008:49514955.
[8]Lu R, Lin X, Zhu H, et al. ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications[C]∥Proc of INFOCOM’08, 2008:12291237.
[9]Wasef A, Jiang Y, Shen X. ECMV: Efficient Certificate Management Scheme for Vehicular Networks[C]∥Proc of IEEE Globecom’08, 2008:15.
[10]Sun Y, Lin X, Lu R, et al. A Secure and Efficient Revocation Scheme for Anonymous Vehicular Communications[C]∥Proc of IEEE ICC’10, 2010:16. |