Security of vehicular ad-hoc networks: A comprehensive survey
Vehicles equipped with significant computing, communication and sensing (also known as
“smart” vehicles), are being focused by Intelligent Transportation Systems (ITS). The …
“smart” vehicles), are being focused by Intelligent Transportation Systems (ITS). The …
Systematizing decentralization and privacy: Lessons from 15 years of research and deployments
Decentralized systems are a subset of distributed systems where multiple authorities control
different components and no authority is fully trusted by all. This implies that any component …
different components and no authority is fully trusted by all. This implies that any component …
An identity-based security system for user privacy in vehicular ad hoc networks
Vehicular ad hoc network (VANET) can offer various services and benefits to users and thus
deserves deployment effort. Attacking and misusing such network could cause destructive …
deserves deployment effort. Attacking and misusing such network could cause destructive …
Anonysense: privacy-aware people-centric sensing
Personal mobile devices are increasingly equipped with the capability to sense the physical
world (through cameras, microphones, and accelerometers, for example) and the, network …
world (through cameras, microphones, and accelerometers, for example) and the, network …
Threshold bbs+ signatures for distributed anonymous credential issuance
We propose a secure multiparty signing protocol for the BBS+ signature scheme; in other
words, an anonymous credential scheme with threshold issuance. We prove that due to the …
words, an anonymous credential scheme with threshold issuance. We prove that due to the …
[PDF][PDF] The cyber security body of knowledge
D Basin - University of Bristol, ch. Formal Methods for, 2021 - cybok.org
The CyBOK project would like to understand how the CyBOK is being used and its uptake.
The project would like organisations using, or intending to use, CyBOK for the purposes of …
The project would like organisations using, or intending to use, CyBOK for the purposes of …
Group signatures with almost-for-free revocation
Group signatures are a central cryptographic primitive where users can anonymously and
accountably sign messages in the name of a group they belong to. Several efficient …
accountably sign messages in the name of a group they belong to. Several efficient …
Enabling reputation and trust in privacy-preserving mobile sensing
X Wang, W Cheng, P Mohapatra… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
Mobile sensing is becoming a popular paradigm to collect information from and outsource
tasks to mobile users. These applications deal with lot of personal information, eg, identity …
tasks to mobile users. These applications deal with lot of personal information, eg, identity …
Scalable group signatures with revocation
Group signatures are a central cryptographic primitive, simultaneously supporting
accountability and anonymity. They allow users to anonymously sign messages on behalf of …
accountability and anonymity. They allow users to anonymously sign messages on behalf of …
SoK: anonymous credentials
Anonymous credentials are a powerful tool for making assertions about identity while
maintaining privacy and have been the subject of study for many years. The interest in …
maintaining privacy and have been the subject of study for many years. The interest in …