A survey of security and privacy issues in v2x communication systems

T Yoshizawa, D Singelée, JT Muehlberg… - ACM Computing …, 2023 - dl.acm.org
Vehicle-to-Everything (V2X) communication is receiving growing attention from industry and
academia as multiple pilot projects explore its capabilities and feasibility. With about 50% of …

Analysis of blockchain solutions for IoT: A systematic literature review

SK Lo, Y Liu, SY Chia, X Xu, Q Lu, L Zhu, H Ning - Ieee Access, 2019 - ieeexplore.ieee.org
The Internet of Things (IoT) aims at connecting things to the Internet in a peer-to-peer
paradigm for data collecting and data sharing in our daily life. A blockchain is an immutable …

[图书][B] Understanding cryptography

C Paar, J Pelzl - 2010 - Springer
This is the second edition of Understanding Cryptography. Ever since we released the first
edition in 2009, we have been humbled by the many positive responses we received from …

[图书][B] Introduction to modern cryptography: principles and protocols

J Katz, Y Lindell - 2007 - taylorfrancis.com
Cryptography plays a key role in ensuring the privacy and integrity of data and the security of
computer networks. Introduction to Modern Cryptography provides a rigorous yet accessible …

Elliptic curve cryptography

D Hankerson, A Menezes - Encyclopedia of Cryptography, Security and …, 2021 - Springer
Background Elliptic curve cryptographic schemes were proposed independently in 1985 by
Neal Koblitz (Koblitz 1987) and Victor Miller (Miller 1986). They are the elliptic curve …

[图书][B] Cryptography: theory and practice

DR Stinson - 2005 - api.taylorfrancis.com
THE LEGACYFirst introduced in 1995, Cryptography: Theory and Practice garnered
enormous praise and popularity, and soon became the standard textbook for cryptography …

The concept of security and trust in electronic payments

T Tsiakis, G Sthephanides - Computers & Security, 2005 - Elsevier
The use of electronic communication channels to conduct businesses without the need for
physical conduct or presence has already been established and accepted warmly. But the …

[图书][B] Identity management: Concepts, technologies, and systems

E Bertino, K Takahashi - 2010 - books.google.com
Digital identity can be defined as the digital representation of the information known about a
specific individual or organization. Digital identity management technology is an essential …

eGov-DAO: A better government using blockchain based decentralized autonomous organization

N Diallo, W Shi, L Xu, Z Gao, L Chen… - … on eDemocracy & …, 2018 - ieeexplore.ieee.org
E-government system has greatly improved the efficiency and transparency of daily
operations of a government. However, most of existing e-government services are provided …

Quantum permutation pad for universal quantum-safe cryptography

R Kuang, M Barbeau - Quantum Information Processing, 2022 - Springer
Classical cryptographic techniques are currently under the growing quantum computing
threat. New techniques that quantum computing algorithms cannot break are urgently …