1 |
HAN Y, SONG W, ZHOU Z, et al. eCLAS: an efficient pairing-free certificateless aggregate signature for secure VANET communication [J]. IEEE Systems Journal, 2022, 16 (1): 1637-1648.
|
2 |
QI J Y, GAO T H, DENG X Y, et al. A pseudonym-based certificateless privacy-preserving authentication scheme for VANETs [J]. Vehicular Communications, 2022, 38.
|
3 |
YANG Q, ZHU X Q, WANG X L, et al. A novel authentication and key agreement scheme for internet of vehicles [J]. Future Generation Computer Systems, 2023, 145: 415-428.
|
4 |
GHANE S, JOLFEI A, KULK L, et al. Preserving privacy in the internet of connected vehicles [J]. IEEE Transactions on Intelligent Transportation Systems, 2020, 22 (8): 5018-5027.
|
5 |
AZAM S, BIBI M, RIAZ R, et al. Collaborative learning based sybil attack detection in vehicular AD-HOC networks (VANETS) [J]. Sensors, 2022, 22 (18).
|
6 |
WANG X J, NIE L S, NING Z L, et al. Deep learning-based network traffic prediction for secure backbone networks in internet of vehicles [J]. ACM Transactions on Internet Technology, 2022, 22 (4): 1-20.
|
7 |
FUEYO M, HERRANZ J. On the efficiency of revocation in RSA-based anonymous systems [J]. IEEE Transactions on Information Forensics and Security, 2016, 11 (8): 1771-1779.
|
8 |
MOHAMED T M, AHMED I Z, SADEK R A. Efficient VANET safety message delivery and authenticity with privacy preservation [J]. PeerJ Computer Science, 2021, 7.
|
9 |
ALI I, CHEN Y, ULLAH N, et al. An efficient and provably secure ECC-based conditional privacy-preserving authentication for vehicle-to-vehicle communication in VANETs [J]. IEEE Transactions on Vehicular Technology, 2021, 70(2): 1278-1291.
|
10 |
GUO R, XU L, LI X, et al. An efficient certificateless ring signcryption scheme with conditional privacy-preserving in VANETs [J]. Journal of Systems Architecture, 2022, 129.
|
11 |
GOUDARZI S, SOLEYMANI S A, ANISI M H, et al. A privacy-preserving authentication scheme based on Elliptic Curve Cryptography and using Quotient Filter in fog-enabled VANET [J]. Ad Hoc Networks, 2022, 128.
|
12 |
BERNSTEIN D J, LANGE T. Post-quantum cryptography [J]. Nature, 2017, 549: 188–194.
|
13 |
ZHANG L, KANG B, DAI F F, et al. Hybrid and hierarchical aggregation-verification scheme for VANET [J]. IEEE Transactions on Vehicular Technology, 2022, 71 (10): 11189-11200.
|
14 |
WASEF A, LU R, LIN X, et al. Complementing public key infrastructure to secure vehicular ad hoc networks [security and privacy in emerging wireless networks] [J]. IEEE Wireless Communications, 2010, 17 (5): 22-28.
|
15 |
SALEM A H, ABDEL-HAMID A, EL-NASR M A. The case for dynamic key distribution for PKI-based VANETs [J]. International Journal of Computer Networks & Communications (IJCNC), 2016, 6 (1): 61-78.
|
16 |
XI N, LI W H, JING L, et al. ZAMA: a ZKP-based anonymous mutual authentication scheme for the IoV [J]. IEEE Internet of Things Journal, 2022, 9 (22): 22903-22913.
|
17 |
LI J, LI Y, CAO C, et al. Conditional anonymous authentication with abuse-resistant tracing and distributed trust for internet of vehicles [J]. IEEE Internet of Things Journal, 2021, 9 (11): 8749-8762.
|
18 |
TAN H W, ZHENG W Y, GUAN Y G, et al. A privacy-preserving attribute-based authenticated key management scheme for accountable vehicular communications [J]. IEEE Transactions on Vehicular Technology, 2023, 72 (3): 3622-3635.
|
19 |
JIAO R H, OUYANG H, LIN Y, et al. A computation-efficient group key distribution protocol based on a new secret sharing scheme [J]. Information, 2019, 10 (5): 175.
|
20 |
YILDIZ H, CENK M, ONUR E. PLGAKD: a PUF-based lightweight group authentication and key distribution protocol [J]. IEEE Internet of Things Journal, 2020, 8 (7): 5682-5696.
|
21 |
SHAWKY M A, JABBAR A, USMAN M, et al. Efficient blockchain-based group key distribution for secure authentication in VANETs [J]. IEEE Networking Letters, 2023, 74.
|
22 |
KAMIL I A, OGUNDOYIN S O. A lightweight certificateless authentication scheme and group key agreement with dynamic updating mechanism for LTE-V-based internet of vehicles in smart cities [J]. Journal of Information Security and Applications, 2021, 63: 102994.
|
23 |
CREMERS C. Scyther: semantics and verification of security protocols [J]. Technische Universittndhoven, 2006.
|
24 |
薛庆水,卢子譞,杨谨瑜.基于Shamir的动态强前向安全签名方案[J].计算机应用研究, 2023, 40(5):1522-1527, 1534.
|
|
XUE Q S, LU Z X, YANG J Y. Dynamic strong forward secure signature scheme based on shamir [J]. Application Research of Computers, 2023, 40(5): 1522-1527, 1534.
|
25 |
向新银.格上基于身份的前向安全签名方案[J].计算机工程, 2015, 41(9):155-158.
|
|
XIANG X Y. Identity-based forward secure signature scheme from lattices [J]. Computer Engineering, 2015, 41 (9): 155-158.
|