2012
DOI: 10.1109/tvt.2012.2186992
|View full text |Cite
|
Sign up to set email alerts
|

${\cal CPAS}$: An Efficient Conditional Privacy-Preserving Authentication Scheme for Vehicular Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
209
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 314 publications
(209 citation statements)
references
References 18 publications
0
209
0
Order By: Relevance
“…We attempt to provide the correct proof for Shim's IBS using a completely different approach. In our proof, we show that the IBS scheme in [21] is CID-CMA secure. 4.…”
Section: Introductionmentioning
confidence: 76%
See 3 more Smart Citations
“…We attempt to provide the correct proof for Shim's IBS using a completely different approach. In our proof, we show that the IBS scheme in [21] is CID-CMA secure. 4.…”
Section: Introductionmentioning
confidence: 76%
“…We find that there is a flaw in the proof of the IBS in [21]. Although it is claimed to be CID-CMA, we show that the proof of the corresponding theorem cannot attend the claimed security.…”
Section: Introductionmentioning
confidence: 87%
See 2 more Smart Citations
“…So the size of an element in group G 1 is 1024 bits using an elliptic curve with 160 bits q. By standard compression technique [27], the size of an element in group G 1 can be reduced to 65 bytes. The size of an element in G 2 is 1024 bits.…”
Section: Performance Discussionmentioning
confidence: 99%