Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
VANET
biblio
Privacy-Preserving Authentication Based on Pseudonyms and Secret Sharing for VANET
Submitted by grigby1 on Thu, 08/13/2020 - 5:22pm
revocation overhead
privacy
privacy-preserving authentication
private key cryptography
pseudonymous certificates
pseudonyms
pubcrawl
Public key
resilience
Resiliency
n) threshold secret sharing
Roads
Scalability
secret sharing
Shamir (t
telecommunication security
VANET
vehicular ad hoc networks
vehicular communications
DCS schemes
anonymous messaging
authentication
authentication overhead
authorisation
backward security
certificate revocation list
certificate updating overhead
CPPT
data privacy
anonymous communications
ECPP scheme
EMAP scheme
forward security
framed attacks
hash chain
hash chains
hybrid scheme
message authentication
biblio
An Anonymous Conditional Privacy-Preserving Authentication Scheme for VANETs
Submitted by grigby1 on Thu, 08/13/2020 - 5:21pm
Protocols
wireless environment
verifiable secret sharing(VSS)
verifiable secret sharing
vehicular ad hoc networks
Vehicular ad hoc network(VANET)
VANET
Traffic Safety
telecommunication traffic
telecommunication security
Security analysis
Scalability
Resiliency
resilience
pubcrawl
anonymous conditional authentication scheme
privacy-preserving requirements
privacy-preserving authentication scheme
Privacy-preserving
privacy
mutual authentication phase
message generation
message authentication code(MAC)
message authentication code
message authentication
data privacy
Cryptography
communication overhead
authentication
anonymous messaging
biblio
Efficient and Secure Proxy re-signature Message Authentication Scheme in Vehicular Ad Hoc Network
Submitted by aekwall on Mon, 08/03/2020 - 10:19am
Metrics
vehicular ad hoc networks
vehicular ad hoc network
VANET
Trusted Computing
trusted center traceability
security requriements
secure proxy resignature message authentication scheme
roadside unit
Resiliency
random oracle model
public key cryptography
proxy re-signature
privacy protection problem
pubcrawl
Internet of Vehicles
formal verification
Elliptic curves
elliptic curve
efficiency requirements
efficiency analysis
ECDLP hard problem
digital signatures
data privacy
conditional privacy protection
Compositionality
Batch verification
Ad Hoc Network Security
biblio
Enhancing the Performance Analysis of LWA Protocol Key Agreement in Vehicular Ad hoc Network
Submitted by aekwall on Mon, 08/03/2020 - 10:18am
telecommunication security
Resiliency
restricted lightweight authentication protocol
road accidents
road safety
road side units
Roads
RSU
Security Arrangements
Protocols
user authentication
V2CH
V2V
VANET
vehicle-to-vehicle communication
vehicular ad hoc network
vehicular ad hoc networks
pubcrawl
private key cryptography
password
NS2 simulation
NS-2 simulation
mystery keys
Metrics
LWA protocol key agreement
key agreement
India
Cryptographic Protocols
Compositionality
car safety
automobiles
authentication
Ad Hoc Network Security
biblio
Identity-Based Aggregate Signature Scheme in Vehicle Ad-hoc Network
Submitted by aekwall on Mon, 08/03/2020 - 10:18am
message authentication
vehicular ad hoc networks
vehicle network
vehicle identity
vehicle anonymity
vehicle ad-hoc network
VANET
telecommunication security
Resiliency
privacy preserving
privacy
Metrics
message signatures
pubcrawl
identity-based aggregate signature scheme
digital signatures
data privacy
Cryptography
Compositionality
Cloud Computing
authorisation
authentication
Aggregates
aggregate signature algorithm
Aggregate Signature
Ad Hoc Network Security
biblio
BayesTrust and VehicleRank: Constructing an Implicit Web of Trust in VANET
Submitted by aekwall on Mon, 07/13/2020 - 11:20am
BayesTrust
Web page ranking algorithms
vehicular ad hoc network
VehicleRank
untrusted nodes
threat models
social trust relationship
random topology
pagerank
local trust relationships
local trust information
IWOT-V
implicit Web of trust
global trust relationships
explicit link structure
cooperative intelligent transport system
telecommunication security
web of trust
Intelligent Transportation Systems
Web pages
trust model
telecommunication network topology
mobile ad hoc networks
Topology
VANET
Computational modeling
Social network services
Peer-to-peer computing
vehicular ad hoc networks
composability
pubcrawl
Resiliency
biblio
Trusted Autonomous Vehicle: Measuring Trust using On-Board Unit Data
Submitted by grigby1 on Fri, 06/19/2020 - 11:48am
traffic engineering computing
road accidents
road safety
road traffic
Roads
safe transportation
Scalability
security of data
substantial relevance
substantial traffic congestions
telecommunication traffic
Resiliency
traffic information
traffic simulation model
transmitted messages
trust
trusted autonomous vehicle
trustworthiness
VANET
vehicle dynamics
vehicle trust measurement
vehicular ad hoc networks
measuring trust
autonomous vehicle
AV
different OBU components
Driverless Car
extremely dynamic topographical conditions
false information
false trust
Global Positioning System
GPS data
Intelligent Transportation System
Autonomous automobiles
misleading information
On Board Unit
on-board unit components
on-board unit data
policy-based governance
Policy-Governed Secure Collaboration
pubcrawl
realistic traffic data
Reliability
resilience
biblio
Using a Distributed Roadside Unit for the Data Dissemination Protocol in VANET With the Named Data Architecture
Submitted by aekwall on Tue, 05/26/2020 - 11:11am
stand-alone node RSU
intelligent transport system (ITS)
intermittent connection lifetime
multihop wireless network
named data architecture
named data network (NDN)
named data networking approach
NDN architecture
network simulator
NS3 software packages
RA-NDN protocol
real-world data
SA-RSU
improved network connectivity
SUMO software packages
TCP/IP implementation
total dissemination time
traffic load
traffic simulator software
vehicle to roadside unit (V2R)
vehicular ad hoc network (VANET)
vehicular densities
vehicular NDN
vehicular transmission ranges
Named Data Network Security
internet
IP networks
Scalability
Servers
telecommunication traffic
Protocols
transport protocols
Resiliency
Human behavior
pubcrawl
Routing protocols
Roads
vehicular ad hoc networks
computer network security
radio networks
VANET
data storage
computer network reliability
vehicular ad hoc network
vehicles
ad hoc communications
data dissemination
data dissemination protocol
data received ratio
distributed roadside unit
biblio
CUIF: Control of Useless Interests Flooding in Vehicular Named Data Networks
Submitted by aekwall on Tue, 05/26/2020 - 11:10am
safety related applications
content name
Control of Useless Interests Flooding
CUIF scheme
data
efficient communication environment
Interest forwarding storm
outgoing Interest packets
Producer vehicle
NDN
traditional host centric approach
vehicle address
Vehicular Ad-hoc Network
vehicular information network technology
Vehicular Named Data Network
Vehicular Named Data networks
VNDN
Named Data Network Security
Roads
Scalability
Servers
security
Protocols
transport protocols
Resiliency
Human behavior
pubcrawl
IP networks
VANETs
vehicular ad hoc networks
internet
VANET
Interest
named data networks
vehicular
biblio
A Secure Blockchain-Based Group Mobility Management Scheme in VANETs
Submitted by grigby1 on Fri, 03/27/2020 - 11:28am
Security analysis
Protocols
pubcrawl
resilience
Resiliency
Safe Coding
safe transportation
secure blockchain-based group mobility management scheme
secure group mobility management scheme
security
policy-based governance
security functionalities
significant overload
smooth handovers
telecommunication security
VANET
VANETs
vehicular ad hoc networks
Vehicular Ad-hoc Network
high mobility
blockchain
collaboration
Distributed Mobility Management
distributed mobility management protocol
DMM solutions
frequent handovers
group communication scenario
Handover
handover authentication
authentication
Human behavior
Human Factors
message authentication
Metrics
mobility management (mobile radio)
network architecture
network entities
next generation mobile network
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »