[HTML][HTML] Secure authentication and privacy-preserving techniques in Vehicular Ad-hoc NETworks (VANETs)

D Manivannan, SS Moni, S Zeadally - Vehicular Communications, 2020 - Elsevier
In the last decade, there has been growing interest in Vehicular Ad Hoc NETworks
(VANETs). Today car manufacturers have already started to equip vehicles with …

A survey of key management for secure group communication

S Rafaeli, D Hutchison - ACM Computing Surveys (CSUR), 2003 - dl.acm.org
Group communication can benefit from IP multicast to achieve scalable exchange of
messages. However, there is a challenge of effectively controlling access to the transmitted …

Cyber security in the smart grid: Survey and challenges

W Wang, Z Lu - Computer networks, 2013 - Elsevier
The Smart Grid, generally referred to as the next-generation power system, is considered as
a revolutionary and evolutionary regime of existing power grids. More importantly, with the …

A survey on the communication architectures in smart grid

W Wang, Y Xu, M Khanna - Computer networks, 2011 - Elsevier
The next-generation electric power systems (smart grid) are studied intensively as a
promising solution for energy crisis. One important feature of the smart grid is the integration …

[SÁCH][B] Cryptography: theory and practice

DR Stinson - 2005 - api.taylorfrancis.com
THE LEGACYFirst introduced in 1995, Cryptography: Theory and Practice garnered
enormous praise and popularity, and soon became the standard textbook for cryptography …

Broadcast encryption

A Fiat, M Naor - Advances in Cryptology—CRYPTO'93: 13th Annual …, 1994 - Springer
We introduce new theoretical measures for the qualitative and quantitative assessment of
encryption schemes designed for broadcast transmissions. The goal is to allow a central …

Packet leashes: a defense against wormhole attacks in wireless networks

YC Hu, A Perrig, DB Johnson - IEEE INFOCOM 2003. Twenty …, 2003 - ieeexplore.ieee.org
As mobile ad hoc network applications are deployed, security emerges as a central
requirement. In this paper, we introduce the wormhole attack, a severe attack in ad hoc …

Collusion resistant broadcast encryption with short ciphertexts and private keys

D Boneh, C Gentry, B Waters - Annual international cryptology conference, 2005 - Springer
We describe two new public key broadcast encryption systems for stateless receivers. Both
systems are fully secure against any number of colluders. In our first construction both …

Revocation and tracing schemes for stateless receivers

D Naor, M Naor, J Lotspiech - … in Cryptology—CRYPTO 2001: 21st Annual …, 2001 - Springer
We deal with the problem of a center sending a message to a group of users such that some
subset of the users is considered revoked and should not be able to obtain the content of the …

TESLA broadcast authentication

A Perrig, JD Tygar, A Perrig, JD Tygar - Secure Broadcast Communication …, 2003 - Springer
How can we authenticate broadcast messages? This chapter begins to answer our central
question. We introduce TESLA, short for Timed Efficient Stream Loss-tolerant Authentication …