Author:
Li Kang,Lau Wang Fat,Au Man Ho
Publisher
Springer International Publishing
Reference25 articles.
1. Lecture Notes in Computer Science;SS Al-Riyami,2003
2. Au, M.H., Mu, Y., Chen, J., Wong, D.S., Liu, J.K., Yang, G.: Malicious KGC attacks in certificateless cryptography. In: Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, pp. 302–311. ACM (2007)
3. Biswas, S., Mišić, J.: Relevance-based verification of vanet safety messages. In: 2012 IEEE International Conference on Communications (ICC), pp. 5124–5128. IEEE (2012)
4. Chim, T.W., Yiu, S.-M., Hui, L.C., Li, V.O.: Specs: secure and privacy enhancing communications schemes for vanets. Ad Hoc Netw. 9(2), 189–203 (2011)
5. Cui, J., Wei, L., Zhang, J., Xu, Y., Zhong, H.: An efficient message-authentication scheme based on edge computing for vehicular ad hoc networks. IEEE Trans. Intell. Transp. Syst. 20(5), 1621–1632 (2019)
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Wormhole Filters: Caching Your Hash on Persistent Memory;Proceedings of the Nineteenth European Conference on Computer Systems;2024-04-22
2. On the Privacy of Adaptive Cuckoo Filters: Analysis and Protection;IEEE Transactions on Information Forensics and Security;2024
3. Bamboo Filters: Make Resizing Smooth and Adaptive;IEEE/ACM Transactions on Networking;2024
4. Conditional Privacy-preserving Authentication and Message Dissemination Scheme using Timestamp based Pseudonyms for VANETs;2023 International Wireless Communications and Mobile Computing (IWCMC);2023-06-19
5. Bamboo Filters: Make Resizing Smooth;2022 IEEE 38th International Conference on Data Engineering (ICDE);2022-05