Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey of security and privacy issues in v2x communication systems
Vehicle-to-Everything (V2X) communication is receiving growing attention from industry and
academia as multiple pilot projects explore its capabilities and feasibility. With about 50% of …
academia as multiple pilot projects explore its capabilities and feasibility. With about 50% of …
Survey on issues and recent advances in vehicular public-key infrastructure (VPKI)
Public-key infrastructure (PKI) provides the essential foundation for public-key cryptography,
and security is often bootstrapped from a PKI. Standardization bodies, organizations …
and security is often bootstrapped from a PKI. Standardization bodies, organizations …
Essential technics of cybersecurity for intelligent connected vehicles: Comprehensive review and perspective
Y Shichun, Z Zheng, M Bin, Z Yifan… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
Along with the promotion of intelligent connected vehicles (ICVs), the problems of network
attacks have rapidly increased, and thus the cybersecurity has drawn much attention …
attacks have rapidly increased, and thus the cybersecurity has drawn much attention …
Security of 6G enabled vehicle-to-everything communication in emerging federated learning and blockchain technologies
Sixth-generation (6G) communication is emerging as a seamless and massive connection of
almost all digital devices. Vehicles, which are extensively linked with human mobility, must …
almost all digital devices. Vehicles, which are extensively linked with human mobility, must …
Zone encryption with anonymous authentication for V2V communication
Vehicle-to-vehicle (V2V) communication systems are currently being prepared for real-world
deployment, but they face strong opposition over privacy concerns. Position beacon …
deployment, but they face strong opposition over privacy concerns. Position beacon …
Faster verification of V2X basic safety messages via Message Chaining
Abstract Vehicular-to-Everything (V2X) communications enable vehicles to exchange
messages with other entities, including nearby vehicles and pedestrians. V2X is, thus …
messages with other entities, including nearby vehicles and pedestrians. V2X is, thus …
Using Range-Revocable Pseudonyms to Provide Backward Unlinkability in the Edge
In this paper we propose a novel abstraction that we have named Range-Revocable
Pseudonyms (RRPs). RRPs are a new class of pseudonyms whose validity can be revoked …
Pseudonyms (RRPs). RRPs are a new class of pseudonyms whose validity can be revoked …
A privacy-preserving and transparent identity management scheme for vehicular social networking
Vehicular social networking is expected to become a reality soon, where secure and privacy-
preserving identity management is a prerequisite. Various organizations and studies have …
preserving identity management is a prerequisite. Various organizations and studies have …
LARP: A lightweight auto-refreshing pseudonym protocol for V2X
Vehicle-to-everything (V2X) communication is the key enabler for emerging intelligent
transportation systems. Applications built on top of V2X require both authentication and …
transportation systems. Applications built on top of V2X require both authentication and …
[PDF][PDF] Efficient and timely revocation of v2x credentials
In Intelligent Transport Systems, secure communication between vehicles, infrastructure,
and other road users is critical to maintain road safety. This includes the revocation of …
and other road users is critical to maintain road safety. This includes the revocation of …