[HTML][HTML] Secure authentication and privacy-preserving techniques in Vehicular Ad-hoc NETworks (VANETs)

D Manivannan, SS Moni, S Zeadally - Vehicular Communications, 2020‏ - Elsevier
In the last decade, there has been growing interest in Vehicular Ad Hoc NETworks
(VANETs). Today car manufacturers have already started to equip vehicles with …

A survey of key management for secure group communication

S Rafaeli, D Hutchison - ACM Computing Surveys (CSUR), 2003‏ - dl.acm.org
Group communication can benefit from IP multicast to achieve scalable exchange of
messages. However, there is a challenge of effectively controlling access to the transmitted …

Cyber security in the smart grid: Survey and challenges

W Wang, Z Lu - Computer networks, 2013‏ - Elsevier
The Smart Grid, generally referred to as the next-generation power system, is considered as
a revolutionary and evolutionary regime of existing power grids. More importantly, with the …

A survey on the communication architectures in smart grid

W Wang, Y Xu, M Khanna - Computer networks, 2011‏ - Elsevier
The next-generation electric power systems (smart grid) are studied intensively as a
promising solution for energy crisis. One important feature of the smart grid is the integration …

[كتاب][B] Cryptography: theory and practice

DR Stinson - 2005‏ - api.taylorfrancis.com
THE LEGACYFirst introduced in 1995, Cryptography: Theory and Practice garnered
enormous praise and popularity, and soon became the standard textbook for cryptography …

Packet leashes: a defense against wormhole attacks in wireless networks

YC Hu, A Perrig, DB Johnson - IEEE INFOCOM 2003. Twenty …, 2003‏ - ieeexplore.ieee.org
As mobile ad hoc network applications are deployed, security emerges as a central
requirement. In this paper, we introduce the wormhole attack, a severe attack in ad hoc …

Collusion resistant broadcast encryption with short ciphertexts and private keys

D Boneh, C Gentry, B Waters - Annual international cryptology conference, 2005‏ - Springer
We describe two new public key broadcast encryption systems for stateless receivers. Both
systems are fully secure against any number of colluders. In our first construction both …

Revocation and tracing schemes for stateless receivers

D Naor, M Naor, J Lotspiech - … in Cryptology—CRYPTO 2001: 21st Annual …, 2001‏ - Springer
We deal with the problem of a center sending a message to a group of users such that some
subset of the users is considered revoked and should not be able to obtain the content of the …

TESLA broadcast authentication

A Perrig, JD Tygar, A Perrig, JD Tygar - Secure Broadcast Communication …, 2003‏ - Springer
How can we authenticate broadcast messages? This chapter begins to answer our central
question. We introduce TESLA, short for Timed Efficient Stream Loss-tolerant Authentication …

[كتاب][B] Protocols for authentication and key establishment

C Boyd, A Mathuria, D Stebila - 2003‏ - Springer
The first edition of this book was published in 2003. Inevitably, certain parts of the book
became outdated quickly. At the same time new developments have continued apace …