[1] Raya M, Hubaux J P. Securing vehicular ad hoc networks[J]. Journal of Computer Security, 2007, 15(1):39-68.
[2] Lu Huang, Li Jie, and M. Guizani. A novel ID-based authentication framework with adaptive privacy preservation for VANETs. Computing, Communications and Applications Conference IEEE, 2012:345-350.
[3] Zeng Shengke, Huang Yuan, Liu Xingwei. Privacy-preserving communication for VANETs with conditionally anonymous ring signature[J]. International Journal of Network Security, 2015, 17(2):135-141.
[4] Lin Xiaodong, Sun Xiaoting, Ho P H, et al. Gsis:a secure and privacy-preserving protocol for vehicular communications[J]. IEEE Transactions on Vehicular Technology, 2007, 56(6):3442-3456.
[5] Liu Hui, Li Hui, Ma Zhanxin. Efficient and secure authentication protocol for VANET[C]//International Conference on Computational Intelligence and Security.[S.l.]:IEEE Computer Society, 2010:523-527.
[6] Mamun M S I, Miyaji A, Takada H. A multi-purpose group signature for vehicular network security[C]//International Conference on Network-Based Information Systems.[S.l.]:IEEE, 2014:511-516.
[7] Shao Jun, Lin Xiaodong, Lu Rongxing, et al. A Threshold Anonymous Authentication Protocol for VANETs[J]. IEEE Transactions on Vehicular Technology, 2016, 65(3):1711-1720.
[8] Zhu Xiaoyan, Jiang Shunrong, Wang Liangmin, et al. Privacy-preserving authentication based on group signature for VANETs[C]//Globecom Workshops.[S.l.]:IEEE, 2013:4609-4614.
[9] Zhu Xiaoyan, Jiang Shunrong, Wang Liangmin, et al. Efficient privacy-preserving authentication for vehicular ad hoc networks[J]. IEEE Transactions on Vehicular Technology, 2014, 63(2):907-919.
[10] He Li, Zhu Wentao, Mitigating dos attacks against signature-based authentication in VANETs[C]//IEEE International Conference on Computer Science and Automation Engineering.[S.l.]:IEEE, 2012:261-265.
[11] 刘文, 罗守山, 杨义先, 等. 安全两方圆计算协议[J]. 北京邮电大学学报, 2009, 32(3):32-35. Liu Wen, Luo Shoushan, Yang Yixian, et al. A study of secure two-party circle computation problem[J]. Journal of Beijing University of Posts and Telecommunications, 2009, 32(3):32-35.
[12] Sundari S, Ananthi M. Secure multi-party computation in differential private data with Data Integrity Protection[C]//International Conference on Computing and Communications Technologies.[S.l.]:IEEE, 2015:180-184.
[13] Shi Runhua, Zhong Hong, Huang Liusheng. A novel anonymous authentication scheme without cryptography[J]. Transactions on Emerging Telecommunications Technologies, 2014, 25(9):875-880. |