1. Ateniese G, Herzberg A, Krawczyk H, et al. Untraceable mobility or how to travel incognito [J]. Computer Networks, 1999, 31(8): 871–884.
2. Eliane J, Guillaume P. On the security of homage group authentication protocol [C] // Proceedings of FC’01. Berlin: Springer-Verlag, 2001: 106–116.
3. Chan H L, Deng X, Zhu H. Design and security analysis of anonymous group identification protocols [C] // Proceedings of PKC’02. Berlin: Springer-Verlag, 2002: 399–402.
4. Kong J, Hong X, Gerla M. An identity-free and on-demand routing scheme against anonymity threats in mobile ad hoc networks [J]. IEEE Transactions on Mobile Computing, 2007, 6(8): 888–902.
5. Zhang C, Lu R, Ho P H, et al. A location privacy preserving authentication scheme in vehicular networks [C] // IEEE Wireless Communications & Networking Conference. Washington D C: IEEE Press, 2008: 2543–2548.