Y Sun, R Lu, X Lin, X Shen, J Su - IEEE Transactions on …, 2010 - ieeexplore.ieee.org
… authenticationscheme with strong privacypreservation, named PASS, for vehicular communications. Unlike traditional pseudonymous authenticationschemes, … privacypreservation …
… We proposed a new lightweight two-layered authenticationscheme with privacypreservation to achieve V2V communication in vehicular networks. The proposed scheme eliminates …
P Gope, B Sikdar - IEEE Internet of Things Journal, 2018 - ieeexplore.ieee.org
… In Section III, we present our proposed privacypreserving two-factor authentication protocol for IoT devices. Security of the proposed scheme is analyzed in Section IV. Performance …
F Wang, Y Xu, H Zhang, Y Zhang… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
… is the first authenticationscheme which achieves both strong privacypreservation and DoS … , additionally it is also the first authenticationscheme trying to authenticate multiple users of …
H Zhong, S Han, J Cui, J Zhang, Y Xu - Information Sciences, 2019 - Elsevier
… We propose a privacy-preservingauthenticationscheme which achieves full aggregation in VANET, and we can see that the scheme satisfies the security requirements in VANET …
TW Chim, SM Yiu, LCK Hui… - 2011 IEEE International …, 2011 - ieeexplore.ieee.org
… This paper attempts to develop a scheme to address these two seemingly contradicting … a privacypreservingauthenticationscheme to solve the problem. The authentication process is …
Z Lu, Q Wang, G Qu, H Zhang… - IEEE Transactions on Very …, 2019 - ieeexplore.ieee.org
… extend the conventional blockchain structure to provide a distributed authenticationscheme without the revocation list. To achieve conditional privacy, we allow a vehicle to use multiple …
D He, S Zeadally, B Xu, X Huang - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
… a CPPA scheme for VANETs that does not use bilinear paring and we demonstrate that it could supports both the mutual authentication and the privacy protection simultaneously. Our …
… practical authenticationscheme for mobile devices. First, we demonstrate that Truong et al.’s scheme… Second, we show that Li et al.’s privacy-preservingscheme, which was proposed at …