[HTML][HTML] Secure authentication and privacy-preserving techniques in Vehicular Ad-hoc NETworks (VANETs)
D Manivannan, SS Moni, S Zeadally - Vehicular Communications, 2020 - Elsevier
In the last decade, there has been growing interest in Vehicular Ad Hoc NETworks
(VANETs). Today car manufacturers have already started to equip vehicles with …
(VANETs). Today car manufacturers have already started to equip vehicles with …
Privacy-preserving public auditing for secure cloud storage
Using cloud storage, users can remotely store their data and enjoy the on-demand high-
quality applications and services from a shared pool of configurable computing resources …
quality applications and services from a shared pool of configurable computing resources …
Oruta: Privacy-preserving public auditing for shared data in the cloud
With cloud data services, it is commonplace for data to be not only stored in the cloud, but
also shared across multiple users. Unfortunately, the integrity of cloud data is subject to …
also shared across multiple users. Unfortunately, the integrity of cloud data is subject to …
An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks without pairings
NW Lo, JL Tsai - IEEE Transactions on Intelligent …, 2015 - ieeexplore.ieee.org
Constructing intelligent and efficient transportation systems for modern metropolitan areas
has become a very important quest for nations possessing metropolitan cities with ever …
has become a very important quest for nations possessing metropolitan cities with ever …
Privacy-preserving public auditing for data storage security in cloud computing
Cloud Computing is the long dreamed vision of computing as a utility, where users can
remotely store their data into the cloud so as to enjoy the on-demand high quality …
remotely store their data into the cloud so as to enjoy the on-demand high quality …
Panda: Public auditing for shared data with efficient user revocation in the cloud
With data storage and sharing services in the cloud, users can easily modify and share data
as a group. To ensure shared data integrity can be verified publicly, users in the group need …
as a group. To ensure shared data integrity can be verified publicly, users in the group need …
Provable multicopy dynamic data possession in cloud computing systems
AF Barsoum, MA Hasan - IEEE Transactions on Information …, 2014 - ieeexplore.ieee.org
Increasingly more and more organizations are opting for outsourcing data to remote cloud
service providers (CSPs). Customers can rent the CSPs storage infrastructure to store and …
service providers (CSPs). Customers can rent the CSPs storage infrastructure to store and …
A scalable robust authentication protocol for secure vehicular communications
Existing authentication protocols to secure vehicular ad hoc networks (VANETs) raise
challenges such as certificate distribution and revocation, avoidance of computation and …
challenges such as certificate distribution and revocation, avoidance of computation and …
Knox: privacy-preserving auditing for shared data with large groups in the cloud
With cloud computing and storage services, data is not only stored in the cloud, but routinely
shared among a large number of users in a group. It remains elusive, however, to design an …
shared among a large number of users in a group. It remains elusive, however, to design an …
Efficient privacy-preserving authentication for vehicular ad hoc networks
X Zhu, S Jiang, L Wang, H Li - IEEE Transactions on Vehicular …, 2013 - ieeexplore.ieee.org
In this paper, we present an efficient privacy-preserving authentication scheme based on
group signature for vehicular ad hoc networks (VANETs). Although group signature is widely …
group signature for vehicular ad hoc networks (VANETs). Although group signature is widely …