参考文献
[1]常促宇,向勇,史美林.车载自组网的现状与发展[J].通信学报,2007,28(11):116-126.
[2]Shao Caixing,Leng Supeng,Zhang Yan.A Multi-priority Supported Medium Access Control in Vehicular Ad Hoc Networks[J].Computer Communications,2014,39(15):11-21.
[3]刘辉.车载自组织网络信息认证和隐私保护机制的研究[D].西安:西安电子科技大学,2012.
[4]Raya M,Hubaux J P.The Security of Vehicular Ad Hoc Networks[C]//Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks.New York,USA:ACM Press,2005:21-31.
[5]Lin Xiaodong,Sun Xiaoting,Ho Pin-Han.GSIS:A Secure and Privacy-preserving Protocol for Vehicular Communications[J].IEEE Transactions on Vehicular Technology,2007,56(6):3442-3456.
[6]Lu Rongxing,Lin Xiaodong,Zhu Haojin.ECPP:Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications[C]//Proceedings of INFOCOM’08.Phoenix,USA:IEEE Press,2008:1229-1237.
[7]杨涛,胡建斌,陈钟.一种可追溯的车载自组网隐私保护认证协议[J].计算机工程,2013,39(8):161-165.
[8]孙超亮,曹珍富,梁晓辉.门限代理重签名方案[J].计算机工程,2009,35(4):128-130.
[9]Tian Miaomiao.Identity-based Proxy Re-signatures from Lattices[J].Information Processing Letters,2015,115(4):462-467.
[10]Shamir A.How to Share a Secret[J].Communications of the ACM,1979,22(11):612-613.
[11]杨小东,王彩芬.前向安全的单向门限代理重签名[J].计算机应用,2011,31(3):801-804.
[12]杨涛,孔令波,胡建斌,等.车辆自组网隐私保护研究综述[J].计算机研究与发展,2012,49(S2):178-185.
[13]Zhang Chenxi,Lin Xiaodong,Lu Rongxing,et al.An Efficient Message Authentication Scheme for Vehicular Communications[J].IEEE Transactions on Vehicular Technology,2008,57(6):3357-3368.
[14]Raffaele B,Maddalena N.Efficient Data Collection in Multimedia Vehicular Sensing Platforms[J].Pervasive and Mobile Computing,2015,16(PA):78-95.
编辑陆燕菲 |