Impact Factor:6.549
Scopus Suggested Journal: |
International Journal
of Computer Engineering in Research Trends (IJCERT)
Scholarly, Peer-Reviewed, Open Access and Multidisciplinary
International Journal of Computer Engineering in Research Trends. Scholarly, Peer-Reviewed,Open Access and Multidisciplinary
ISSN(Online):2349-7084 Submit Paper Check Paper Status Conference Proposal
[1] Jun Shao, Xiaodong Lin, “A threshold anonymous authentication protocol for valet” [2] S. Dietzel, E. Schoch, B. K¨onings, M. Weber, and F. Kargl, “Resilient, secure aggregation for vehicular networks,” IEEE Network, vol. 24, no. 1, pp. 26–31, 2010. [Online]. Available: http://dx.doi.org/10.1109/ MNET.2010.5395780 [3] “The car two car communication consortium,” http://www.car-to-car.org/. [4] P. Papadimitratos, L. Butty´an, T. Holczer, E. Schoch, J. Freudiger, M. Raya, Z. Ma, F. Kargl, A. Kung, and J. Hubaux, “Secure vehicular communication systems: Design and architecture,” CoRR, vol. abs/0912.5391, 2009. [Online]. Available: http://arxiv.org/abs/0912.5391 [5] G. Ateniese, J. Camenisch, M. Joye, and G. Tsudik, “A practical and provably secure coalition-resistant group signature scheme,” in Advances in Cryptology - CRYPTO 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings, 2000, pp. 255–270. [Online]. Available: http://dx.doi.org/10.1007/3-540-44598-6 16 [6] J. Hubaux, S. Capkun, and J. Luo, “The security and privacy of smart vehicles,” IEEE Security & Privacy, vol. 2, no. 3, pp. 49–55, 2004. [Online]. Available: http://doi.ieeecomputersociety.org/10.1109/ MSP.2004.26 [7] M. Raya and J. Hubaux, “Securing vehicular ad hoc networks,” Journal of Computer Security, vol. 15, no. 1, pp. 39–68, 2007. [Online]. Available: http://iospress.metapress.com/openurl.asp?genre= article&issn=0926-227X&volume=15&issue=1&spage=39 [8] Y. Sun, R. Lu, X. Lin, X. Shen, and J. Su, “An ef?cient pseudonymous authentication scheme with strong privacy preservation for vehicular communications,” IEEE T. Vehicular Technology, vol. 59, no. 7, pp. 3589–3603, 2010. [Online]. Available: http: //dx.doi.org/10.1109/TVT.2010.2051468 [9] X. Lin and X. Li, “Achieving ef?cient cooperative message authentication in vehicular ad hoc networks,” IEEE T. Vehicular Technology, vol. 62, no. 7, pp. 3339–3348, 2013. [Online]. Available: http://dx.doi.org/10.1109/TVT.2013.2257188 [10] L. Wischhof, A. Ebner, and H. Rohling, “Information dissemination in self-organizing intervehicle networks,” IEEE Transactions on Intelligent Transportation Systems, vol. 6, no. 1, pp. 90–101, 2005. [Online]. Available: http://dx.doi.org/10.1109/TITS.2004.842407 [11] P. Golle, D. H. Greene, and J. Staddon, “Detecting and correcting malicious data in vanets,” in Proceedings of the First International Workshop on Vehicular Ad Hoc Networks, 2004, Philadelphia, PA, USA, October 1, 2004, 2004, pp. 29–37. [Online]. Available: http://doi.acm.org/10.1145/1023875.1023881 [12] L. Zhang, Q. Wu, A. Solanas, and J. Domingo-Ferrer, “A scalable robust authentication protocol for secure vehicular communications,” IEEE T. Vehicular Technology, vol. 59, no. 4, pp. 1606–1617, 2010. [Online]. Available: http://dx.doi.org/10.1109/TVT.2009.2038222 [13] L. Chen, S. Ng, and G. Wang, “Threshold anonymous announcement in vanets,” IEEE Journal on Selected Areas in Communications, vol. 29, no. 3, pp. 605–615, 2011. [Online]. Available: http: //dx.doi.org/10.1109/JSAC.2011.110310 [14] U. S. D. of Transportation, “Dedicated short range communications,” http://www.its.dot.gov/DSRC/. [15] D. Chaum and E. van Heyst, “Group signatures,” in Advances in Cryptology - EUROCRYPT ’91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings, 1991, pp. 257–265. [Online]. Available: http://dx.doi.org/10.1007/3-540-46416-6 22 [16] D. Boneh, X. Boyen, and H. Shacham, “Short group signatures,” in Advances in Cryptology - CRYPTO 2004, 24th Annual International CryptologyConference, Santa Barbara, California, USA, August 1519, 2004, Proceedings, 2004, pp. 41–55. [Online]. Available: http://dx.doi.org/10.1007/978-3-540-28628-8 3 [17] Anusha.V,K.Sumalatha,” Mobile Social Networks for Flattering Unsigned Profile Matching ,” International Journal of Computer Engineering In Research Trends.,vol.1,no.6,pp. 384-390,2014. [18] D.Ramanjaneyulu ,U.Usha Rani,” In Service-Oriented MSN Providing Trustworthy Service Evaluation,” International Journal of Computer Engineering In Research Trends.,vol.2,no.12,pp. 1192-1197,2015. [19] Komal Patil, Geeta Mahajan, Disha Patil and Chitra Mahajan,” Implementation of Motion Model Using Vanet,” International Journal of Computer Engineering In Research Trends.,vol.3,no.4,pp. 179-182,2016. [20] Pocha Nageswara Reddy, I.S.Raghuram, Dr.S.Prem Kumar,” Advance EMAP for Vehicular Ad Hoc Networks.” International Journal of Computer Engineering In Research Trends.,vol.1,no.4,pp. 253-258,2016.
V4I8003.pdf |
Latest issue :Volume 10 Issue 1 Articles In press
☞ INVITING SUBMISSIONS FOR THE NEXT ISSUE : |
---|
☞ LAST DATE OF SUBMISSION : 31st March 2023 |
---|
☞ SUBMISSION TO FIRST DECISION : In 7 Days |
---|
☞ FINAL DECISION : IN 3 WEEKS FROM THE DAY OF SUBMISSION |
---|