deteriorate 发表于 2025-3-21 18:23:17

书目名称Efficient and Provably Secure Schemes for Vehicular Ad-Hoc Networks影响因子(影响力)<br>        http://impactfactor.cn/if/?ISSN=BK0303015<br><br>        <br><br>书目名称Efficient and Provably Secure Schemes for Vehicular Ad-Hoc Networks影响因子(影响力)学科排名<br>        http://impactfactor.cn/ifr/?ISSN=BK0303015<br><br>        <br><br>书目名称Efficient and Provably Secure Schemes for Vehicular Ad-Hoc Networks网络公开度<br>        http://impactfactor.cn/at/?ISSN=BK0303015<br><br>        <br><br>书目名称Efficient and Provably Secure Schemes for Vehicular Ad-Hoc Networks网络公开度学科排名<br>        http://impactfactor.cn/atr/?ISSN=BK0303015<br><br>        <br><br>书目名称Efficient and Provably Secure Schemes for Vehicular Ad-Hoc Networks被引频次<br>        http://impactfactor.cn/tc/?ISSN=BK0303015<br><br>        <br><br>书目名称Efficient and Provably Secure Schemes for Vehicular Ad-Hoc Networks被引频次学科排名<br>        http://impactfactor.cn/tcr/?ISSN=BK0303015<br><br>        <br><br>书目名称Efficient and Provably Secure Schemes for Vehicular Ad-Hoc Networks年度引用<br>        http://impactfactor.cn/ii/?ISSN=BK0303015<br><br>        <br><br>书目名称Efficient and Provably Secure Schemes for Vehicular Ad-Hoc Networks年度引用学科排名<br>        http://impactfactor.cn/iir/?ISSN=BK0303015<br><br>        <br><br>书目名称Efficient and Provably Secure Schemes for Vehicular Ad-Hoc Networks读者反馈<br>        http://impactfactor.cn/5y/?ISSN=BK0303015<br><br>        <br><br>书目名称Efficient and Provably Secure Schemes for Vehicular Ad-Hoc Networks读者反馈学科排名<br>        http://impactfactor.cn/5yr/?ISSN=BK0303015<br><br>        <br><br>

吞下 发表于 2025-3-21 22:12:18

http://reply.papertrans.cn/31/3031/303015/303015_2.png

逃避责任 发表于 2025-3-22 01:08:44

http://reply.papertrans.cn/31/3031/303015/303015_3.png

brassy 发表于 2025-3-22 06:54:16

Preliminaries,riefly discuss signcryption, the necessary security requirements/services for VANETs, mathematical background, computational assumptions, random oracle model (ROM), security notions, and the cryptographic libraries. All of these are used in the design of digital signature and signcryption schemes.

好忠告人 发表于 2025-3-22 12:22:18

Authentication Scheme for Vehicle-to-Infrastructure Communications using Bilinear Pairing,malicious third party modifying and retransmitting intercepted messages. Generally, VANETs make use of the PKI-based signature schemes to authenticate and determine the integrity of traffic-related messages. These schemes do possess the aforementioned properties of being able to authenticate messages as well as ensure their integrity.

acheon 发表于 2025-3-22 14:19:06

http://reply.papertrans.cn/31/3031/303015/303015_6.png

acheon 发表于 2025-3-22 21:03:10

Certificateless Signature-Based Authentication Scheme for Vehicle-to-Infrastructure Communications VANETs should ensure authentication, integrity, and other security requirements. In addition, it is necessary to ensure each vehicle’s privacy, i.e., protect its original identity from malicious vehicles that try to get information about its identity, current position, and direction [., .].

奇怪 发表于 2025-3-23 01:08:11

Bilinear Pairing-Based Signcryption Scheme for Secure Heterogeneous Vehicle-to-Infrastructure Commudifference includes the use of varying cryptographic techniques in establishing secure communications among vehicles and infrastructure in VANETs [.]. In other words, in VANETs, it is common to have senders using different cryptographic techniques from receivers.

Legion 发表于 2025-3-23 02:08:51

ECC-Based Hybrid Signcryption Protocol for Secure Heterogeneous Vehicle-to-Infrastructure Communicathat uses a different security mechanism or when a vehicle that uses a security mechanism can transmit a safety message to the infrastructure, i.e., a road-side unit (RSU) that uses a different security mechanism for the verification of the corresponding message [., .].

Condyle 发表于 2025-3-23 06:23:52

Der Mensch in der digitalen Arbeitswelt,ns, and scalar multiplications in group .) in message signing and signature verification phases. In addition, the scheme [.] presented in the previous chapter also contains one bilinear pairing operation in signature verification.
页: [1] 2 3 4 5
查看完整版本: Titlebook: Efficient and Provably Secure Schemes for Vehicular Ad-Hoc Networks; Ikram Ali,Yong Chen,Meng Li Book 2022 The Editor(s) (if applicable) a