[HTML][HTML] Secure authentication and privacy-preserving techniques in Vehicular Ad-hoc NETworks (VANETs)

D Manivannan, SS Moni, S Zeadally - Vehicular Communications, 2020 - Elsevier
In the last decade, there has been growing interest in Vehicular Ad Hoc NETworks
(VANETs). Today car manufacturers have already started to equip vehicles with …

Privacy-preserving public auditing for secure cloud storage

C Wang, SSM Chow, Q Wang, K Ren… - IEEE transactions on …, 2011 - ieeexplore.ieee.org
Using cloud storage, users can remotely store their data and enjoy the on-demand high-
quality applications and services from a shared pool of configurable computing resources …

Oruta: Privacy-preserving public auditing for shared data in the cloud

B Wang, B Li, H Li - IEEE transactions on cloud computing, 2014 - ieeexplore.ieee.org
With cloud data services, it is commonplace for data to be not only stored in the cloud, but
also shared across multiple users. Unfortunately, the integrity of cloud data is subject to …

An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks without pairings

NW Lo, JL Tsai - IEEE Transactions on Intelligent …, 2015 - ieeexplore.ieee.org
Constructing intelligent and efficient transportation systems for modern metropolitan areas
has become a very important quest for nations possessing metropolitan cities with ever …

Privacy-preserving public auditing for data storage security in cloud computing

C Wang, Q Wang, K Ren, W Lou - 2010 proceedings ieee …, 2010 - ieeexplore.ieee.org
Cloud Computing is the long dreamed vision of computing as a utility, where users can
remotely store their data into the cloud so as to enjoy the on-demand high quality …

Panda: Public auditing for shared data with efficient user revocation in the cloud

B Wang, B Li, H Li - IEEE Transactions on services computing, 2013 - ieeexplore.ieee.org
With data storage and sharing services in the cloud, users can easily modify and share data
as a group. To ensure shared data integrity can be verified publicly, users in the group need …

Provable multicopy dynamic data possession in cloud computing systems

AF Barsoum, MA Hasan - IEEE Transactions on Information …, 2014 - ieeexplore.ieee.org
Increasingly more and more organizations are opting for outsourcing data to remote cloud
service providers (CSPs). Customers can rent the CSPs storage infrastructure to store and …

A scalable robust authentication protocol for secure vehicular communications

L Zhang, Q Wu, A Solanas… - IEEE Transactions on …, 2009 - ieeexplore.ieee.org
Existing authentication protocols to secure vehicular ad hoc networks (VANETs) raise
challenges such as certificate distribution and revocation, avoidance of computation and …

Knox: privacy-preserving auditing for shared data with large groups in the cloud

B Wang, B Li, H Li - Applied Cryptography and Network Security: 10th …, 2012 - Springer
With cloud computing and storage services, data is not only stored in the cloud, but routinely
shared among a large number of users in a group. It remains elusive, however, to design an …

Efficient privacy-preserving authentication for vehicular ad hoc networks

X Zhu, S Jiang, L Wang, H Li - IEEE Transactions on Vehicular …, 2013 - ieeexplore.ieee.org
In this paper, we present an efficient privacy-preserving authentication scheme based on
group signature for vehicular ad hoc networks (VANETs). Although group signature is widely …