Two-Factor Privacy Preserving Protocol for Efficient Authentication in Internet of Vehicles Networks
Internet of Vehicles (IoV) has greatly improved safety and quality of services in intelligent
transportation system (ITS). However, the deployed dedicated short-range communication …
transportation system (ITS). However, the deployed dedicated short-range communication …
Trust Mechanism Privacy Protection Scheme Combining Blockchain and Multi-Party Evaluation
Z Shen, Y Wang, H Wang, P Liu, K Liu… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Aiming to address issues of query request submission, data transmission leakage, and
vehicle privacy leakage caused by untrustworthy cooperating Partners (CPs) in privacy …
vehicle privacy leakage caused by untrustworthy cooperating Partners (CPs) in privacy …
BCS-CPP: A Blockchain and Collaborative Service-Based Conditional Privacy-Preserving Scheme for Internet of Vehicles
Z Zeng, Q Zhou, K Wei, N Yang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Vehicle data privacy is one of the major concerns for people on the Internet of Vehicles (IoV).
However, existing conditional privacy protection schemes have limitations and do not …
However, existing conditional privacy protection schemes have limitations and do not …
EFSC: Efficient and Forward-Secure Conditional Privacy-Preserving Scheme for Internet of Vehicles
The interconnected environment of the Internet of Vehicles (IoV) facilitates the development
of various low-carbon and secure location-based services. However, sharing data with semi …
of various low-carbon and secure location-based services. However, sharing data with semi …
A Privacy-Preserving Data Aggregation Protocol for Internet of Vehicles with Federated Learning
Federated learning (FL) is widely used in various fields because it can guarantee the privacy
of the original data source. However, in data-sensitive fields such as Internet of Vehicles …
of the original data source. However, in data-sensitive fields such as Internet of Vehicles …
EPP-GAS: An Efficient and Privacy-Preserving Cross Trust-Domain Group Authentication Scheme for Vehicle Platoon Based on Blockchain
Y **a, S Zhu, X Liu, Q Zhong - IEEE Transactions on Intelligent …, 2024 - ieeexplore.ieee.org
The vehicle platooning (VP) going across different regions together, plays an important role
in improving traffic efficiency. Then how to perform authentication efficiently for the vehicle …
in improving traffic efficiency. Then how to perform authentication efficiently for the vehicle …
Practical and Malicious Multiparty Private Set Intersection for Small Sets
Private set intersection (PSI) is a pivotal subject in the realm of privacy computation.
Numerous research endeavors have concentrated on situations involving vast and …
Numerous research endeavors have concentrated on situations involving vast and …
Hardware-acceleration based privacy-aware authentication scheme for internet of vehicles
U Madububambachu, R Fatima, K White… - 2024 IEEE 3rd …, 2024 - ieeexplore.ieee.org
Technological advancements have led to the devel-opment of smart cities, enabling
intelligent urban management. The Internet of Vehicles (IoV) is a fundamental technology …
intelligent urban management. The Internet of Vehicles (IoV) is a fundamental technology …
Secure and Privacy-Preserving Group Management Scheme for Vehicular Digital Twin
C Lai, J Tan, G Li, D Zheng - 2024 IEEE/CIC International …, 2024 - ieeexplore.ieee.org
The integration of digital twin technology and the Internet of Vehicles has garnered
significant attention. Vehicular digital twin (VDT) involves uploading physical vehicle data to …
significant attention. Vehicular digital twin (VDT) involves uploading physical vehicle data to …
A Lightweight Node Verification and Protection Strategy for Edge Computing
J Du, G Zhang - 2024 5th International Seminar on Artificial …, 2024 - ieeexplore.ieee.org
To alleviate the burden on the core network, edge computing has rapidly advanced to
support distributed computing. However, as sensitive information is delegated to the edge …
support distributed computing. However, as sensitive information is delegated to the edge …