We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 1,199 results
  1. A Pseudonym Changing Strategy for Dynamic Grou** in VANETs

    For complex VANETs and highly dynamic vehicles, vehicle location privacy becomes increasingly important. Pseudonyms are commonly used in VANETs to...
    Conference paper 2024
  2. An Anonymous Authentication Scheme Based on Self-generated Pseudonym for VANETs

    With the maturity of mobile communication and Internet of Things, the extensive deployment of Vehicular Ad-hoc Networks (VANETs) and the popularity...
    Conference paper 2022
  3. Pseudonym Changing Strategy with Mix Zones Based Authentication Protocol for Location Privacy in Road Networks

    A great advancement has been made in intelligent transportation system and communication technologies in order to exchange secure information between...

    Imran Memon, Hina Memon, Qasim Ali Arain in Wireless Personal Communications
    Article 18 November 2020
  4. Combination of Pseudonym Changing with Blockchain-Based Data Credibility for Verifying Accuracy of Latest Vehicle Information in VANETs

    With the rapid development of the automobile industry, the security of vehicle communication networks and the authenticity of messages have been...
    Conference paper 2022
  5. Blockchain-Based Privacy-Aware Pseudonym Management Framework for Vehicular Networks

    Vehicular networks rely on public key infrastructure (PKI) to generate the long-term and short-term (pseudonyms) certified pair of keys. This allows...

    Leila Benarous, Benamar Kadri, Ahmed Bouridane in Arabian Journal for Science and Engineering
    Article 12 March 2020
  6. Pseudonym Schemes Based on Location Privacy Protection in VANETs: A Survey

    In vehicle ad-hoc networks (VANETs), the location privacy of vehicles is a major security issue. In recent years, a large amount of pseudonym-based...
    Conference paper 2021
  7. Cryptography-based location privacy protection in the Internet of Vehicles

    The evolution of the Internet of Things paradigm in recent years demonstrate a significant impact on the transportation sector, leading to the...

    George Routis, George Katsouris, Ioanna Roussaki in Journal of Ambient Intelligence and Humanized Computing
    Article Open access 21 May 2024
  8. An anonymous and secure key agreement protocol for NFC applications using pseudonym

    Near Field Communication (NFC) is a promising technology that facilitate E-commerce through contactless communications. In the past decade, the NFC...

    Mahdi Ghafoorian, Morteza Nikooghadam in Wireless Networks
    Article 27 April 2020
  9. Privacy-preserving aggregate signcryption scheme with allowing dynamic updating of pseudonyms for fog-based smart grids

    Fog-based smart grids have been a hit research field in recent years, providing low latency, location-sensitive and latency-aware local data...

    Kunchang Li, Yifan Yang, Shuhao Wang in Peer-to-Peer Networking and Applications
    Article 15 June 2022
  10. An effective variant ring signature-based pseudonym changing mechanism for privacy preservation in mixed zones of vehicular networks

    The privacy information related to the location of the vehicles need to be concealed with utmost care in the vehicular network since its disclosure...

    C. Kalaiarasy, N. Sreenath, A. Amuthan in Journal of Ambient Intelligence and Humanized Computing
    Article 06 May 2019
  11. Cryptanalysis of Near Field Communication Based Authentication Protocol for Mobile Payment System

    Near field communication (NFC) is one of the utmost pullulating technology in the lea of pervasive computing. In the domain of mobile commerce,...

    Pinki Prakash Vishwakarma, Amiya Kumar Tripathy, Srikanth Vemuru in Wireless Personal Communications
    Article 25 June 2021
  12. Blockchain-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks

    Security and privacy are two challenging issues in Vehicular Ad-hoc Networks (VANETs), which have attracted widespread concern from industry and...

    Cheng Gong, Ling **ong, ... **anhua Niu in Journal of Ambient Intelligence and Humanized Computing
    Article 12 April 2022
  13. A conditional privacy-preserving fair electronic payment scheme based on blockchain without trusted third party

    There is an increasing demand for the security of electronic payment systems. The importance of characteristics such as preventing double-spending,...

    Zahra Hatefi, Majid Bayat, ... Seyed Morteza Pournaghi in Journal of Ambient Intelligence and Humanized Computing
    Article 12 January 2022
  14. A location privacy protection scheme for convoy driving in autonomous driving era

    Convoy driving has great potential in the development of autonomous driving industry, which can bring great improvement to the utilization rate of...

    **n Ye, ** Zhou, ... Zhiguang Qin in Peer-to-Peer Networking and Applications
    Article 07 January 2021
  15. A Chebyshev polynomial-based conditional privacy-preserving authentication and group-key agreement scheme for VANET

    Vehicle ad hoc network (VANET) is an open communication environment. Any user can broadcast messages, which means that it can be easily attacked by...

    Jiyun Yang, Jiamin Deng, ... Bo Tang in Nonlinear Dynamics
    Article 25 October 2021
  16. Secure and efficient authentication protocol with user untraceability for global roaming services

    In case of global roaming services, user authentication plays an important role in order to prevent any unauthorized user from accessing services....

    Prasanta Kumar Roy, Ansuman Bhattacharya in Wireless Networks
    Article 07 October 2021
  17. A novel trust management method to preserve privacy in vehicular ad-hoc networks

    Vehicular ad-hoc network is one of the networks based on wireless sensor networks which, nowadays, plays a crucial role in life. Due to the autonomy...

    Davood Behzad, Nazbanoo Farzaneh in Peer-to-Peer Networking and Applications
    Article 02 March 2021
  18. An Efficient Privacy-Preserving Authentication Scheme Based on Shamir Secret Sharing for VANETs

    As the technology of mobile communication and Internet of Things by leaps and bounds, Vehicular Ad-hoc Networks (VANETs), a new type of intelligent...
    Conference paper 2023
  19. A Blockchain enabled location-privacy preserving scheme for vehicular ad-hoc networks

    n the imminent future, with the immense need for improving road safety and demand for enhancing the overall driving experience, the utility of...

    Bhawna Chaudhary, Karan Singh in Peer-to-Peer Networking and Applications
    Article 16 March 2021
  20. Desynchronization resistant privacy preserving user authentication protocol for location based services

    Preserving user privacy and authenticity are essential requirements for location based services in order to protect user’s confidential information...

    Prasanta Kumar Roy, Ansuman Bhattacharya in Peer-to-Peer Networking and Applications
    Article 26 June 2021
Did you find what you were looking for? Share feedback.