[1] |
KAKKASAGERI M S , MANVI S S . Information management in vehicular ad hoc networks: a review[J]. Journal of Network and Computer Applications, 2014,39(1):334-350.
|
[2] |
BITAM S , MELLOUK A , ZEADALLY S . VANET-cloud: a generic cloud computing model for vehicular ad hoc networks[J]. IEEE Wireless Communications, 2015,22(1):96-102.
|
[3] |
IEEE. IEEE standard for WAVE security services for applications and management messages[S]. IEEE. 2013:1-289.
|
[4] |
BAYAT M , BARMSHOORY M , RAHIMI M , et al. A secure authenti-cation scheme for VANETs with batch verification[J]. Wireless Net-works, 2015,21(5):1733-1743.
|
[5] |
CHIM T , YIU S , HUI L , et al. SPECS: secure and privacy enhancing communications schemes for VANETs[J]. Ad Hoc Networks, 2011,9(2):189-203.
|
[6] |
HUANG J L , YEH L Y , CHIEN H Y . ABAKA: an anonymous batch authenticated and key agreement scheme for value-added services in vehicular ad hoc networks[J]. IEEE Transactions on Vehicular Tech-nology, 2011,60(1):248-262.
|
[7] |
RAYA M , HUBAUX J P . The security of vehicular ad hoc net-works[C]// The 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks. 2005:11-21.
|
[8] |
FREUDIGER J , RAYA M , FE′LEGYHA Z , et al. Mix-zones for loca-tion privacy in vehicular networks[C]// ACM Workshop on Wireless Networking for Intelligent Transportation Systems. 2007.
|
[9] |
ZHANG C , LIN X , LU R , et al. RAISE: an efficient RSU-aided mes-sage authentication scheme in vehicular communication networks[C]// ICC'08, 2008:1451-1457.
|
[10] |
LU R , LIN X , ZHU H , et al. ECPP: efficient conditional privacy preservation protocol for secure vehicular communications[J]. IEEE INFOCOM Proceedings, 2008:1229-1237.
|
[11] |
ZHANG C , LU R , LIN X , et al. An efficient identity-based batch verification scheme for vehicular sensor networks[J]. Proceedings IEEE INFOCOM'08, 2008:246-250.
|
[12] |
SHIM K . An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks[J]. IEEE Transactions on Ve-hicular Technology, 2012,61(4):1874-1883.
|
[13] |
LIU J K , YUEN T H , AU M H , et al. Improvements on an authentica-tion scheme for vehicular sensor networks[J]. Expert Systems with Applications, 2014,41(5):2559-2564.
|
[14] |
LEE C C , LAI Y M . Toward a secure batch verification with group testing for VANET[J]. Wireless Networks, 2013,19(6):1441-1449.
|
[15] |
ZHANG J , XU M , LIU L . On the security of a secure batch verifica-tion with group testing for VANET[J]. International Journal of Net-work Security, 2014,16(5):355-362.
|
[16] |
SHIM K . An ID-based aggregate signature scheme with constant pairng computations[J]. Journal of Systems and Software, 2010,83(10):1873-1880.
|
[17] |
李晋国, 林亚平, 李睿 , 等. 车载自组织网络中基于椭圆曲线零知识证明的匿名安全认证机制[J]. 通信学报, 2013,34(5):52-61. LI J G , LIN Y P , LI R , et al. Secure anonymous authentication scheme based on elliptic curve and zero-knowledge proof in VANET[J]. Jour-nal on Communications, 2013,34(5):52-61.
|
[18] |
HORNG S J , TZENG S F , PAN Y , et al. B-SPECS+: batch verifica-tion for secure pseudonymous authentication iv VANET[J]. IEEE Transactions on Information Forensics and Security, 2013,8(11):1860-1875.
|
[19] |
MILLER V S . Use of elliptic curves in cryptography[C]// CRYPTO'85 Proceedings. 1985:417-426.
|
[20] |
SCHNORR C P . Efficient identification and signatures for smart cards[M]// Advances in Cryptology — EUROCRYPT '89. Springer Berlin Heidelberg. 1989:688-689.
|
[21] |
KOBLITZ N . Elliptic curve cryptosystem[J]. Journal of Mathematics of Computation, 1987,48(1):203-209.
|
[22] |
YUAN Y , LI D , TIAN L , et al. Certificateless signature scheme with-out random oracles[C]// Information Security and Assurance. Springer Berlin Heidelberg, 2009:31-40.
|
[23] |
POINTCHEVAL D , STERN J . Security proofs for signature schemes[C]// EUROCRYPT'96. 1996:387-398.
|
[24] |
MIRACL library on Certivox.com[EB/OL]. .
|
[25] |
谢永, 吴黎兵, 何炎祥 , 等. 无间隙的车联网协助下载方法[J]. 通信学报, 2016,37(1):180-190. XIE Y , WU L B , HE Y X , et al. Non-intermittent cooperative downloading approach for VANET[J]. Journal on Communications, 2016,37(1):180-190.
|