[1] |
ZHANG D , CHEN M ,et al. Mobility prediction in telecom cloud using mobile calls[J]. IEEE Wireless Communications, 2014,21(1): 26-32.
|
[2] |
ZHANG D , ZHANG D , XIONG H ,et al. BASA:building mobile ad hoc social networks on top of Android[J]. IEEE Network, 2014,28(1): 4-9.
|
[3] |
KUMARI S V , PARAMASIVAN B . Defense against Sybil attacks and authentication for anonymous location-based routing in MANET[J]. Wireless Networks, 2016: 1-12.
|
[4] |
ZHANG J , SUN Z , LIU S ,et al. On the security of a threshold anonymous authentication protocol for VANETs[C]// Security,Privacy,and Anonymity in Computation,Communication,and Storage. 2016.
|
[5] |
YAO L , LIN C , WU G ,et al. An anonymous authentication scheme in data-link layer for VANETs[J]. International Journal of Ad Hoc &Ubiquitous Computing, 2016,22(1): 1-13.
|
[6] |
JIANG S , ZHU X , WANG L . An efficient anonymous batch authentication scheme based on HMAC for VANETs[J]. IEEE Transactions on Intelligent Transportation Systems, 2016,17(8): 2193-2204.
|
[7] |
ZHANG C , LU R , LIN X ,et al. An efficient identity-based batch verification scheme for vehicular sensor networks[C]// IEEE INFOCOM. 2008: 246-250.
|
[8] |
CHIM T W , YIU S M , HUI L C K ,et al. SPECS:secure and privacy enhancing communications schemes for VANETs[J]. Ad Hoc Networks, 2011,9(2): 189-203.
|
[9] |
HORNGORNG S J , TZENG S F , PAN Y ,et al. b-SPECS+:batch verification for secure pseudonymous authentication in VANET[J]. IEEE Transactions on Information Forensics & Security, 2013,8(11): 1860-1875.
|
[10] |
TONG Z , LU H , HAENGGI M ,et al. A stochastic geometry approach to the modeling of DSRC for vehicular safety communication[J]. IEEE Transactions on Intelligent Transportation Systems, 2016,17(5): 1448-1458.
|
[11] |
LAM T , RIETSCH K . Total positivity,schubert positivity,and geometric Satake[J]. Journal of Algebra, 2016,460: 284-319.
|
[12] |
赵臻, 陈杰, 张跃宇 ,等. VANET中高效撤销的批量验证群签名方案[J]. 密码学报, 2016,3(3): 292-306.
|
|
ZHAO Z , CHEN J , ZHANG Y Y ,et al. Efficient revocable group signature scheme with batch verification in VANET[J]. Journal of Cryptologic Research, 2016,3(3): 292-306.
|
[13] |
FIAT A , . Batch RSA[C]// International Cryptology Conference on Advances in Cryptology. 1989: 175-185.
|
[14] |
HARN L . Batch verifying multiple DSA-type digital signatures[J]. Electronics Letters, 1998,34(9): 870-871.
|
[15] |
HAITNER I , OMRI E , ZAROSIM H . Limits on the usefulness of random oracles[J]. Journal of Cryptology, 2016,29(2): 283-335.
|
[16] |
POINTCHEVAL D , STEM J . Provably secure blind signature schemes[C]// Advances in Cryptology ASIACRYPT'96. 1996: 252-265.
|
[17] |
刘哲, 刘建伟, 伍前红 ,等. 车载网络中安全有效分布式的假名生成[J]. 通信学报, 2015,36(11): 33-40.
|
|
LIU Z,LIU J W , WU Q H , et a1 . Secure and efficient distributed pseudonym generation in VANET[J]. Journal on Communications, 2015,36(11): 33-40.
|
[18] |
HUANG J L , YEH L Y , CHIEN H Y . ABAKA:an anonymous batch authenticated and key agreement scheme for value-added services in vehicular ad hoc networks[J]. IEEE Transactions on Vehicular Technology, 2011,60(1): 248-262.
|
[19] |
SHAO J , LIN X , LU R ,et al. A threshold anonymous authentication protocol for VANETs[J]. IEEE Transactions on Vehicular Technology, 2016,65(3): 1711-1720.
|
[20] |
LIU Y , HE Z , ZHAO S ,et al. An efficient anonymous authentication protocol using batch operations for VANETs[J]. Multimedia Tools&Applications, 2016: 1-21.
|
[21] |
SHIM K A . An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks[J]. IEEE Transactions on Vehicular Technology, 2012,61(4): 1874-1883.
|