[1] RIVAS D A, BARCELO J M, ZAPATA M G, et al. Security VANETs: privacy, misbehaving nodes, false information and secure data aggregation[J]. Journal of Network and Computer Applications, 2011,34(6):1942-1955. [2] YANG T. Research on VANET privacy protecting based on proxy signature[D]. Beijing: Peking University, 2013.(杨涛.基于代理签名的车辆自组网的隐私保护研究[D].北京:北京大学,2013.) [3] HE M, ZHU W, LI X, et al. Privacy-preserving authentication protocols in vehicular Ad Hoc networks[J]. Journal of Xihua University: Natural Science, 2012,31(4):24-30.(何明星,朱雯,李虓,等.VANETs中保护隐私的认证协议研究与进展[J].西华大学学报:自然科学版,2012,31(4):24-30.) [4] SUN Y. Research on privacy preserving technologies in VANET[D]. Changsha: National University of Defense Technology, 2010.(孙一品.车载自组网隐私保护关键技术研究[D].长沙:国防科学技术大学,2010.) [5] SHI R, ZHONG H, HUANG L. A novel anonymous authentication scheme without cryptography[J]. Transactions on Emerging Telecommunications Technologies, 2014,25(9):875-880. [6] SHIM K A. CPAS: an efficient conditional privacy preserving authentication scheme for vehicular sensor networks[J]. IEEE Transactions on Vehicular Technology, 2012,61(4):1874-1883. [7] RAYA M, HUBAUX J M. Securing vehicular Ad Hoc networks[J]. Journal of Computer Security, 2007,15(1):39-68. [8] SUN Y, LIN X, LU R, et al. Roadside units deployment for efficient short-time certificate updating in VANETs[C]//Proceedings of the 2010 IEEE International Conference on Communications. Piscataway: IEEE Press, 2010:1-5. [9] WEI Y, CHEN Y, SHAN H. Beacon-based trust management for location privacy enhancement VANETs[C]//Proceedings of the 2011 13th Asia-Pacific Network Operations and Management Symposium. Piscataway: IEEE Press, 2011:1-8. [10] LIN X, SUN X, HO P H. GSIS: a secure and privacy-preserving protocol for vehicular communications[J]. IEEE Transactions on Vehicular Technology, 2007,56(6):3442-3456. [11] LU R, LIN X, ZHU H, et al. ECPP: efficient conditional privacy preservation protocol for secure vehicular communications[C]//Proceedings of the 27th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies. Piscataway: IEEE Press, 2008:1229-1237. [12] WAGAN A, MUGHAL B M, HASBULLAH H. VANET security framework for trusted grouping using TPM hardware[C]//Proceedings of the 2010 International Symposium in Information Technology. Washington, DC: IEEE Computer Society, 2010:607-611. [13] HUANG J, YEH L, CHIEA H Y. ABAKA: an anonymous batch authenticated and key agreement scheme for value-added services in vehicular Ad Hoc networks[J]. IEEE Transactions on Vehicular Technology, 2011,60(1):248-262. [14] WASEF A, SHEN X. EMAP: expedite message authentication protocol for vehicular Ad Hoc networks[J]. IEEE Transactions on Mobile Computing, 2013,12(1):78-89. |