2017 International Conference on Networking and Network Applications (NaNA) 2017
DOI: 10.1109/nana.2017.54
|View full text |Cite
|
Sign up to set email alerts
|

Secure and Efficient V2V Communications for Heterogeneous Vehicle Ad Hoc Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(3 citation statements)
references
References 16 publications
0
3
0
Order By: Relevance
“…In the same year, Niu et al [37] proposed a hybrid IBC to CLC scheme for multimessage and multireceiver. Li et al in 2017 [38] proposed a PKI to IBC HS scheme for vehicle ad hoc networks. Niu et al in 2017 [39] proposed a CLC to IBC HS scheme for the privacy-preserving multiparty aggregate scheme.…”
Section: Certificateless Generalized Signcryption Schemesmentioning
confidence: 99%
See 1 more Smart Citation
“…In the same year, Niu et al [37] proposed a hybrid IBC to CLC scheme for multimessage and multireceiver. Li et al in 2017 [38] proposed a PKI to IBC HS scheme for vehicle ad hoc networks. Niu et al in 2017 [39] proposed a CLC to IBC HS scheme for the privacy-preserving multiparty aggregate scheme.…”
Section: Certificateless Generalized Signcryption Schemesmentioning
confidence: 99%
“…The aforementioned schemes [7], [34][35][36][37][38][39][40][41][42][43][44][45][46] suffer from heavy computation and communication costs due to the use of bilinear pairing and an elliptic curve cryptosystem. Moreover, these schemes are not suitable for NDN-based IoT due to its nongeneralized nature.…”
Section: Certificateless Generalized Signcryption Schemesmentioning
confidence: 99%
“…According to the authentication method of public keys, signcryption schemes can be classified as PKI-based signcryption, identity-based signcryption and certificateless signcryption. The PKI-based signcryption used in this paper is a classic signcryption scheme based on elliptic curve cryptography proposed by Zheng [15,16]. This part of the message performed by signcryption is forwarded to eNodeB 2 via eNodeB 1 to request access authentication.…”
Section: The Secure Handover Based On Pre-authentication Mechanismmentioning
confidence: 99%