SCIE, EI, Scopus, INSPEC, DBLP, CSCD, etc.
Citation: | Yong Xi, Ke-Wei Sha, Wei-Song Shi, Loren Schwiebert, Tao Zhang. Probabilistic Adaptive Anonymous Authentication in Vehicular Networks[J]. Journal of Computer Science and Technology, 2008, 23(6): 916-928. |
[1] | Vehicle infrastructure integration. U.S. Department of Transportation, 2006, http://www.its.dot.gov/vii/docs/vii\_factshe\-et.pdf. |
[2] | }Bishop R. A survey of intelligent vehicle applications worldwide. In {\it Proc. IEEE Intelligent Vehicles Symposium 2000}, Dearborn, MI, USA, Oct. 2000, pp.25--30. |
[3] |
} National intelligent transportation systems program plan: A ten-year vision. A Report from Intelligent Transportation Society of America and Department of Transportation. ITSA, DoT, 2002, http://www.itsa.org/itsa/files/pdf/Na\-ti\-onal10YearPlanITSFull.pdf.
|
[4] |
} Mak T, Laberteaux K, Sengupta R. A multi-channel {VANET} providing concurrent safety and commercial services. In {\it Proc. the 2nd ACM International Workshop on Vehicular Ad Hoc Networks}, Cologne, Germany, Sept. 2005, pp.1--9.
|
[5] |
} Dedicated {S}hort {R}ange {C}ommunications ({DSRC}) home. DSRC, 2006, http://grouper.ieee.org/groups/scc32/dsrc/.
|
[6] |
} Hubaux J, Capkun S, Luo J. The security and privacy of smart vehicles. \it IEEE Security and Privacy, \rm 2004, 4(3): 49--55.
|
[7] |
} Raya M, Hubaux J. The security of vehicular ad hoc networks. In {\it Proc. the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks}, Alexandria, VA, USA, Nov. 2005, pp.11--21.
|
[8] |
} D\"otzer F. Privacy issues in vehicular ad hoc networks. In {\it Proc. Workshop on Privacy Enhancing Technologies}, Dubrovnik, Croatia, May 2005, pp.197--209.
|
[9] |
} Choi J, Jakobsson M, Wetzel S. Balancing auditability and privacy in vehicular networks. In {\it Proc. the 1st ACM International Workshop on Quality of Service and Security in Wireless and Mobile Networks}, Montreal, Canada, Oct. 2005, pp.79--87.
|
[10] |
} Sampigethaya K \it et al. \rm {CARAVAN}: Providing location privacy for {VANET}. In {\it Proc. Embedded Security in Cars (ESCAR)}, Cologne, Germany, Nov. 2005.
|
[11] |
} Sun X, Lin X, Ho P P. Secure vehicular communications based on group signature and id-based signature scheme. In {\it Proc. International Conference on Communications (ICC)}, Glasgow, Scotland, Jun. 2007, pp.1539--1545.
|
[12] |
} Lin X, Sun X, Ho P P, Shen X. G{SIS}: A secure and privacy preserving protocol for vehicular communications. {\it IEEE Transactions on Vehicular Technology}, Nov. 2007, 56: 3442--3456.
|
[13] |
} Guo J, Baugh J, Wang S. A group signature based secure and privacy-preserving vehicular communication framework. In {\it Proc. the Mobile Networking for Vehicular Environments (MOVE) Workshop in Conjunction with IEEE INFOCOM}, Anchorage, Alaska, USA, May 2007, pp.103--108.
|
[14] |
} Fonseca E, Festag A, Baldessari R, Aguiar R. Support of anonymity in {VANET}s --- putting pseudonymity into practice. In {\it Proc. IEEE Wireless Communications and Networking Conference (WCNC)}, Hong Kong, China, March 2007, pp.3400--3405.
|
[15] |
} Calandriello G, Papadimitratos P, Lloy A, Hubaux J P. Efficient and robust pseudonymous authentication in {VANET}. In {\it Proc. the Fourth ACM International Workshop on Vehicular Ad Hoc Networks (VANET 2007), in Conjunction with ACM MobiCom 2007}, Montreal, Canada, 2007, pp.19--28.
|
[16] |
} Gedik B, Liu L. Location privacy in mobile systems: A personalized anonymization model. In {\it Proc. the 25th International Conference on Distributed Computing Systems}, Columbus, Ohio, USA, Jun. 2005, pp.620--629.
|
[17] |
} Reid D B. An algorithm for tracking multiple targets. {\it IEEE Transactions on Automatic Control}, Dec. 1979, 24(6): 843--854.
|
[18] |
} Rivest R L, Shamir A, Tauman Y. How to leak a secret. {\it Lecture Notes in Computer Science} 2248, 2001, pp.552--565. http://citeseer.ist.psu.edu/rivest01how.html.
|
[19] |
} Schechter S, Parnell T, Hartemink A. Anonymous authentication of membership in dynamic groups. In {\it Proc. the Third International Conference on Financial Data Security and Digital Commerce}, Anguilla, British West Indies, Jan. 1999, pp.184--195.
|
[20] |
} Auto theft key statistics. Insurance Information Institute, 2007, http://www.iii.org/.
|
[21] |
} {GM} {OnStar} System Could Halt Stolen Cars. Associated Press, 2007.
|
[22] |
} Zeng X, Bagrodia R, Gerla M. Glo{M}o{S}im: A library for parallel simulation of large-scale wireless networks. In {\it Proc. Workshop on Parallel and Distributed Simulation}, Banff, Alberta, Canada, 1998, pp.154--161.
|
[23] |
} Yin J, ElBatt T, Yeung G, Ryu B, Habermas S, Krishnan H, Talty T. Performance evaluation of safety applications over {DSRC} vehicular ad hoc networks. In {\it Proc. the 1st ACM International Workshop on Vehicular Ad Hoc Networks}, Philadelphia, PA, USA, Oct. 2004, pp.1--9.
|
[24] |
} Gruteser M, Grunwald D. Anonymous usage of location-based services through spatial and temporal cloaking. In {\it Proc. ACM MobiSys'03}, San Francisco, CA, USA, May 2003, pp.31--42.
|
[25] |
} Munaka T, Yamamoto T, Watanabe T. A reliable advanced-join system for data multicasting in its networks. {\it IEEE Transactions on Intelligent Transportation Systems}, Dec. 2005, 6(4): 424--437.
|
[26] |
} Traf{N}et: Real-time seattle area traffic conditions over the Internet. University of Washington, 2006, http://www. its.washington.edu/trafnet/.
|
[27] |
} Aijaz A, Bochow B, D\"otzer F, Festag A, Gerlach M, Kroh R. Attacks on inter-vehicle communication systems --- An analysis. In {\it Proc. 3rd International Workshop on Intelligent Transportation (WIT 2006)}, Hamburg, Germany, March 2006.
|
[28] |
} Zarki M, Mehrotra S, Tsudik G, Venkatasubramanian N. Security issues in a future vehicular network. In {\it Proc. EuroWireless 2002}, Florence, Italy, Feb. 2002.
|
[29] |
} Ren K \it et al. \rm A novel privacy preserving authentication and access control scheme for pervasive computing environments. \it IEEE Transactions on Vehicular Technology, \rm 2006, 55(4): 1373--1384.
|