|
[1]
|
Shao, J., Lin, X., Lu, R., et al. (2016) A Threshold Anonymous Authentication Protocol for VANETs. IEEE Transactions on Vehicular Technology, 65, 1711-1720. [Google Scholar] [CrossRef]
|
|
[2]
|
Chim, T.W., Yiu, S.M., Hui, L.C.K., et al. (2009) SPECS: Secure and Privacy Enhancing Communications Schemes for VANETs. Ad Hoc Networks, 9,189-203. [Google Scholar] [CrossRef]
|
|
[3]
|
Wan, Z., Ren, K. and Preneel, B. (2008) A Secure Privacy-Preserving Roaming Protocol Based on Hierarchical Identity-Based Encryption for Mobile networks. ACM Conference on Wireless Network Security, WISEC 2008, Alexandria, 31 March-April, DBLP, 62-67. [Google Scholar] [CrossRef]
|
|
[4]
|
Goldwasser, S., Micali, S. and Rackoff, C. (1989) The Knowledge Complexity of Interactive Proof-Systems. DBLP, 291-304.
|
|
[5]
|
Gódor, G. and Imre, S. (2012) Hash-Based Mutual Authentication Protocol for Low-Cost RFID Systems. Proceedings of the Information and Communication Technologies, Budapest, 76-87. [Google Scholar] [CrossRef]
|
|
[6]
|
Li, X., Liu, H., Wei, F., et al. (2015) A Lightweight Anonymous Authentication Protocol Using k-Pseudonym Set in Wireless Networks. IEEE Global Communications Conference, IEEE, 1-6. [Google Scholar] [CrossRef]
|
|
[7]
|
Syamsuddin, I., Dillon, T., Chang, E., et al. (2008) A Survey of RFID Authentication Protocols Based on Hash-Chain Method. International Conference on Convergence and Hybrid Information Technology, IEEE, 559-564. [Google Scholar] [CrossRef]
|
|
[8]
|
钟成, 李兴华, 宋园园, 马建峰. 无线网络中基于共享密钥的轻量级匿名认证协议[J]. 计算机学报, 2018, 41(5): 4-6.
|