[1] |
FIEBIG B . European traffic accidents and purposed solutions[A]. Proc of the ITU-T Workshop on Standardization in Telecommunication for Motor Vehicles[C]. 2003. 24-25.
|
[2] |
PASSMANN C , BRENZEL C , MESCHENMOSER R . Wireless vehicle to vehicle warning system[A]. SAE 2000 World Congress,Detroit[C]. MI,USA, 2002. 149-154.
|
[3] |
Internet ITS consortium[EB/OL]. .
|
[4] |
LIN X , SUN X , HO P H ,et al. GSIS:a secure and privacy-preserving protocol for vehicular communications[J]. IEEE Transactions on Vehicular Technology, 2007,56(6): 3442-3456.
|
[5] |
STUDER A , SHI E , BAI F ,et al. Tacking together efficient authentication,revocation,and privacy in VANETs[A]. Proceeding of the 6th Annual IEEE Communications Society Conference on Sensor,Mesh and Ad Hoc Communications and Networks(SECON)[C]. 2009. 1-9.
|
[6] |
LI R , LIN X , ZHU H ,et al. ECPP:efficient conditional privacy preservation protocol for secure vehicular communications[A]. Proceeding of the 27th Conference on Computer Communications (INFOCOM)[C]. IEEE, 2008. 1229-1237.
|
[7] |
PENG Y , ABICHAR Z , CHANG J . Roadside-aided routing(RAR) in vehicular networks[A]. Proceeding of International Conference on Communications(ICC)[C]. 2006. 3602-3607.
|
[8] |
KRAWCZYK H , RABIN T . Chameleon hashing and signatures[A]. Proceeding of Network and Distributed System Security 2000[C]. 2000. 143-154.
|
[9] |
ATENIESE G , DE MEDEIROS B . Identity-based chameleon Hash and applications[J]. Financial Cryptography, 2004,3(10): 164-180.
|
[10] |
CHEN X , ZHANG F , KIM K . Chameleon hashing without key exposure[A]. ISC 2004[C]. Springer-Verlag, 2004. 87-98.
|
[11] |
GUO S , ZENG D , XIANG Y . Chameleon hashing for secure and privacy-preserving vehicular communications[J]. IEEE Transactions on Parallel and Distributed Systems, 2013,25(11): 2794-2803.
|
[12] |
BLAKE G S I , SMART N . Elliptic Curves in Cryptography[M]. Cambridge University Press, 1999.
|
[13] |
WANG B Y,LI H,LIU X F,et al.Preserving identity privacy on multi-owner cloud data during public verification[EB/OL]. .
|
[14] |
张青波, 陈彩云, 陈鲁生 ,等. 有限域上多项式形式的EIGamal体制及数字签名方案[J]. 通信学报, 2005,26(5): 69-72. ZHANG Q B , CHEN C Y , CHEN L S ,et al. In the form of polynomial over finite field EIGamal system and digital signature scheme[J]. Journal on Communications, 2005,26(5): 69-72.
|