[HTML][HTML] Secure authentication and privacy-preserving techniques in Vehicular Ad-hoc NETworks (VANETs)
D Manivannan, SS Moni, S Zeadally - Vehicular Communications, 2020 - Elsevier
In the last decade, there has been growing interest in Vehicular Ad Hoc NETworks
(VANETs). Today car manufacturers have already started to equip vehicles with …
(VANETs). Today car manufacturers have already started to equip vehicles with …
A survey of key management for secure group communication
S Rafaeli, D Hutchison - ACM Computing Surveys (CSUR), 2003 - dl.acm.org
Group communication can benefit from IP multicast to achieve scalable exchange of
messages. However, there is a challenge of effectively controlling access to the transmitted …
messages. However, there is a challenge of effectively controlling access to the transmitted …
Cyber security in the smart grid: Survey and challenges
The Smart Grid, generally referred to as the next-generation power system, is considered as
a revolutionary and evolutionary regime of existing power grids. More importantly, with the …
a revolutionary and evolutionary regime of existing power grids. More importantly, with the …
A survey on the communication architectures in smart grid
The next-generation electric power systems (smart grid) are studied intensively as a
promising solution for energy crisis. One important feature of the smart grid is the integration …
promising solution for energy crisis. One important feature of the smart grid is the integration …
[كتاب][B] Cryptography: theory and practice
DR Stinson - 2005 - api.taylorfrancis.com
THE LEGACYFirst introduced in 1995, Cryptography: Theory and Practice garnered
enormous praise and popularity, and soon became the standard textbook for cryptography …
enormous praise and popularity, and soon became the standard textbook for cryptography …
Packet leashes: a defense against wormhole attacks in wireless networks
As mobile ad hoc network applications are deployed, security emerges as a central
requirement. In this paper, we introduce the wormhole attack, a severe attack in ad hoc …
requirement. In this paper, we introduce the wormhole attack, a severe attack in ad hoc …
Collusion resistant broadcast encryption with short ciphertexts and private keys
We describe two new public key broadcast encryption systems for stateless receivers. Both
systems are fully secure against any number of colluders. In our first construction both …
systems are fully secure against any number of colluders. In our first construction both …
Revocation and tracing schemes for stateless receivers
We deal with the problem of a center sending a message to a group of users such that some
subset of the users is considered revoked and should not be able to obtain the content of the …
subset of the users is considered revoked and should not be able to obtain the content of the …
TESLA broadcast authentication
A Perrig, JD Tygar, A Perrig, JD Tygar - Secure Broadcast Communication …, 2003 - Springer
How can we authenticate broadcast messages? This chapter begins to answer our central
question. We introduce TESLA, short for Timed Efficient Stream Loss-tolerant Authentication …
question. We introduce TESLA, short for Timed Efficient Stream Loss-tolerant Authentication …
[كتاب][B] Protocols for authentication and key establishment
C Boyd, A Mathuria, D Stebila - 2003 - Springer
The first edition of this book was published in 2003. Inevitably, certain parts of the book
became outdated quickly. At the same time new developments have continued apace …
became outdated quickly. At the same time new developments have continued apace …