A comprehensive survey on VANET security services in traffic management system

MS Sheikh, J Liang - Wireless Communications and Mobile …, 2019 - Wiley Online Library
Recently, vehicular ad hoc networks (VANETs) embark a great deal of attention in the area
of wireless and communication technology and are becoming one of the prominent research …

Authentication and privacy schemes for vehicular ad hoc networks (VANETs): A survey

I Ali, A Hassan, F Li - Vehicular Communications, 2019 - Elsevier
The intelligent transportation system (ITS) is made possible and practical due to vehicular ad
hoc networks (VANETs) that helps improve drivers safeties and traffic efficiency on road by …

A survey on privacy-preserving authentication schemes in VANETs: Attacks, challenges and open issues

SA Jan, NU Amin, M Othman, M Ali, AI Umar… - IEEE …, 2021 - ieeexplore.ieee.org
Vehicular ad hoc Networks (VANETs) are an emerging technology with robust applications
in Intelligent Transport System. It consists of smart vehicles and roadside infrastructure …

True random number generators

M Stipčević, ÇK Koç - Open problems in mathematics and computational …, 2014 - Springer
Random numbers are needed in many areas: cryptography, Monte Carlo computation and
simulation, industrial testing and labeling, hazard games, gambling, etc. Our assumption has …

[PDF][PDF] Lecture notes on cryptography

S Goldwasser, M Bellare - Summer course “Cryptography and …, 1996 - cseweb.ucsd.edu
Much of the material in Chapters 2, 3 and 7 is a result of scribe notes, originally taken by MIT
graduate students who attended Professor Goldwasser's Cryptography and Cryptanalysis …

[图书][B] Inside blockchain, bitcoin, and cryptocurrencies

N Chowdhury - 2019 - taylorfrancis.com
This book covers blockchain from the underlying principles to how it enables applications to
survive and surf on its shoulder. Having covered the fundamentals of blockchain, the book …

[PDF][PDF] A comparative study among different mathematical sequences in 3d image steganography

W Alexan, M El Beheiry… - International Journal of …, 2020 - researchgate.net
This paper proposes a double–layer message security scheme. The message is first
encrypted using AES-128 and is then embedded within a 3D image using least significant …

SecDedup: Secure data deduplication with dynamic auditing in the cloud

L Peng, Z Yan, X Liang, X Yu - Information Sciences, 2023 - Elsevier
In the era of big data, data explosion has brought challenges to cloud storage management.
To improve cloud storage efficiency and save network communication bandwidth, cloud data …

How to securely release unverified plaintext in authenticated encryption

E Andreeva, A Bogdanov, A Luykx, B Mennink… - … Conference on the …, 2014 - Springer
Scenarios in which authenticated encryption schemes output decrypted plaintext before
successful verification raise many security issues. These situations are sometimes …

Implementing and benchmarking three lattice-based post-quantum cryptography algorithms using software/hardware codesign

VB Dang, F Farahmand… - … Conference on Field …, 2019 - ieeexplore.ieee.org
It has been predicted that within the next tenfifteen years, quantum computers will have
computational power sufficient to break current public-key cryptography schemes. When that …